WorldWideScience

Sample records for technology review computer

  1. Medical imaging technology reviews and computational applications

    CERN Document Server

    Dewi, Dyah

    2015-01-01

    This book presents the latest research findings and reviews in the field of medical imaging technology, covering ultrasound diagnostics approaches for detecting osteoarthritis, breast carcinoma and cardiovascular conditions, image guided biopsy and segmentation techniques for detecting lung cancer, image fusion, and simulating fluid flows for cardiovascular applications. It offers a useful guide for students, lecturers and professional researchers in the fields of biomedical engineering and image processing.

  2. Reviews of computing technology: Software overview

    Energy Technology Data Exchange (ETDEWEB)

    Hartshorn, W.R.; Johnson, A.L.

    1994-01-05

    The Savannah River Site Computing Architecture states that the site computing environment will be standards-based, data-driven, and workstation-oriented. Larger server systems deliver needed information to users in a client-server relationship. Goals of the Architecture include utilizing computing resources effectively, maintaining a high level of data integrity, developing a robust infrastructure, and storing data in such a way as to promote accessibility and usability. This document describes the current storage environment at Savannah River Site (SRS) and presents some of the problems that will be faced and strategies that are planned over the next few years.

  3. Reviews of computing technology: Object-oriented technology

    Energy Technology Data Exchange (ETDEWEB)

    Skeen, D.C.

    1993-03-01

    A useful metaphor in introducing object-oriented concepts is the idea of a computer hardware manufacturer assembling products from an existing stock of electronic parts. In this analogy, think of the parts as pieces of computer software and of the finished products as computer applications. Like its counterpart, the object is capable of performing its specific function in a wide variety of different applications. The advantages to assembling hardware using a set of prebuilt parts are obvious. The design process is greatly simplified in this scenario, since the designer needs only to carry the design down to the chip level, rather than to the transistor level. As a result, the designer is free to develop a more reliable and feature rich product. Also, since the component parts are reused in several different products, the parts can be made more robust and subjected to more rigorous testing than would be economically feasible for a part used in only one piece of equipment. Additionally, maintenance on the resulting systems is simplified because of the part-level consistency from one type of equipment to another. The remainder of this document introduces the techniques used to develop objects, the benefits of the technology, outstanding issues that remain with the technology, industry direction for the technology, and the impact that object-oriented technology is likely to have on the organization. While going through this material, the reader will find it useful to remember the parts analogy and to keep in mind that the overall purpose of object-oriented technology is to create software parts and to construct applications using those parts.

  4. Computer technology for self-management: a scoping review.

    Science.gov (United States)

    Jacelon, Cynthia S; Gibbs, Molly A; Ridgway, John Ve

    2016-05-01

    The purpose of this scoping review of literature is to explore the types of computer-based systems used for self-management of chronic disease, the goals and success of these systems, the value added by technology integration and the target audience for these systems. Technology is changing the way health care is provided and the way that individuals manage their health. Individuals with chronic diseases are now able to use computer-based systems to self-manage their health. These systems have the ability to remind users of daily activities, and to help them recognise when symptoms are worsening and intervention is indicated. However, there are many questions about the types of systems available, the goals of these systems and the success with which individuals with chronic illness are using them. This is a scoping review in which the Cumulative Index of Nursing and Allied Health Literature, PubMed and IEEE Xplore databases were searched. A total of 303 articles were reviewed, 89 articles were read in-depth and 30 were included in the scoping review. The Substitution, Augmentation, Modification, Redefinition model was used to evaluate the value added by the technology integration. Research on technology for self-management was conducted in 13 countries. Data analysis identified five kinds of platforms on which the systems were based, some systems were focused on a specific disease management processes, others were not. For individuals to effectively use systems to maintain maximum wellness, the systems must have a strong component of self-management and provide the user with meaningful information regarding their health states. Clinicians should choose systems for their clients based on the design, components and goals of the systems. © 2016 John Wiley & Sons Ltd.

  5. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  6. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  7. Computation Directorate and Science& Technology Review Computational Science and Research Featured in 2002

    Energy Technology Data Exchange (ETDEWEB)

    Alchorn, A L

    2003-04-04

    Thank you for your interest in the activities of the Lawrence Livermore National Laboratory Computation Directorate. This collection of articles from the Laboratory's Science & Technology Review highlights the most significant computational projects, achievements, and contributions during 2002. In 2002, LLNL marked the 50th anniversary of its founding. Scientific advancement in support of our national security mission has always been the core of the Laboratory. So that researchers could better under and predict complex physical phenomena, the Laboratory has pushed the limits of the largest, fastest, most powerful computers in the world. In the late 1950's, Edward Teller--one of the LLNL founders--proposed that the Laboratory commission a Livermore Advanced Research Computer (LARC) built to Livermore's specifications. He tells the story of being in Washington, DC, when John Von Neumann asked to talk about the LARC. He thought Teller wanted too much memory in the machine. (The specifications called for 20-30,000 words.) Teller was too smart to argue with him. Later Teller invited Von Neumann to the Laboratory and showed him one of the design codes being prepared for the LARC. He asked Von Neumann for suggestions on fitting the code into 10,000 words of memory, and flattered him about ''Labbies'' not being smart enough to figure it out. Von Neumann dropped his objections, and the LARC arrived with 30,000 words of memory. Memory, and how close memory is to the processor, is still of interest to us today. Livermore's first supercomputer was the Remington-Rand Univac-1. It had 5600 vacuum tubes and was 2 meters wide by 4 meters long. This machine was commonly referred to as a 1 KFlop machine [E+3]. Skip ahead 50 years. The ASCI White machine at the Laboratory today, produced by IBM, is rated at a peak performance of 12.3 TFlops or E+13. We've improved computer processing power by 10 orders of magnitude in 50 years, and I do

  8. Reviews of computing technology: Fiber distributed data interface

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.J.

    1992-04-01

    This technology report describes Fiber Distributed Data Interface (FDDI) as a technology, looks at the applications of this technology, examines the current economics of using it, and describe activities and plans by the Information Resource Management Department to implement this technology at the Savannah River Site.

  9. Reviews of computing technology: Fiber distributed data interface. Revision

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.J.

    1992-04-01

    This technology report describes Fiber Distributed Data Interface (FDDI) as a technology, looks at the applications of this technology, examines the current economics of using it, and describe activities and plans by the Information Resource Management Department to implement this technology at the Savannah River Site.

  10. Computer Technology in Clinical Psychology Services for People with Mental Retardation: A Review.

    Science.gov (United States)

    Davies, Sara; Hastings, Richard P.

    2003-01-01

    Review of the literature on computer technology in clinical psychology services for people with mental retardation is organized around stages of a scientist-practitioner working model: assessment, formulation, and intervention. Examples of technologies to facilitate work at each stage are given. Practical difficulties with implementation of…

  11. Cloud Computing Technologies

    Directory of Open Access Journals (Sweden)

    Sean Carlin

    2012-06-01

    Full Text Available This paper outlines the key characteristics that cloud computing technologies possess and illustrates the cloud computing stack containing the three essential services (SaaS, PaaS and IaaS that have come to define the technology and its delivery model. The underlying virtualization technologies that make cloud computing possible are also identified and explained. The various challenges that face cloud computing technologies today are investigated and discussed. The future of cloud computing technologies along with its various applications and trends are also explored, giving a brief outlook of where and how the technology will progress into the future.

  12. Computer analyses for the design, operation and safety of new isotope production reactors: A technology status review

    Energy Technology Data Exchange (ETDEWEB)

    Wulff, W.

    1990-01-01

    A review is presented on the currently available technologies for nuclear reactor analyses by computer. The important distinction is made between traditional computer calculation and advanced computer simulation. Simulation needs are defined to support the design, operation, maintenance and safety of isotope production reactors. Existing methods of computer analyses are categorized in accordance with the type of computer involved in their execution: micro, mini, mainframe and supercomputers. Both general and special-purpose computers are discussed. Major computer codes are described, with regard for their use in analyzing isotope production reactors. It has been determined in this review that conventional systems codes (TRAC, RELAP5, RETRAN, etc.) cannot meet four essential conditions for viable reactor simulation: simulation fidelity, on-line interactive operation with convenient graphics, high simulation speed, and at low cost. These conditions can be met by special-purpose computers (such as the AD100 of ADI), which are specifically designed for high-speed simulation of complex systems. The greatest shortcoming of existing systems codes (TRAC, RELAP5) is their mismatch between very high computational efforts and low simulation fidelity. The drift flux formulation (HIPA) is the viable alternative to the complicated two-fluid model. No existing computer code has the capability of accommodating all important processes in the core geometry of isotope production reactors. Experiments are needed (heat transfer measurements) to provide necessary correlations. It is important for the nuclear community, both in government, industry and universities, to begin to take advantage of modern simulation technologies and equipment. 41 refs.

  13. The Role of Computer-Assisted Technology in Post-Traumatic Orbital Reconstruction: A PRISMA-driven Systematic Review.

    Science.gov (United States)

    Wan, Kelvin H; Chong, Kelvin K L; Young, Alvin L

    2015-12-08

    Post-traumatic orbital reconstruction remains a surgical challenge and requires careful preoperative planning, sound anatomical knowledge and good intraoperative judgment. Computer-assisted technology has the potential to reduce error and subjectivity in the management of these complex injuries. A systematic review of the literature was conducted to explore the emerging role of computer-assisted technologies in post-traumatic orbital reconstruction, in terms of functional and safety outcomes. We searched for articles comparing computer-assisted procedures with conventional surgery and studied outcomes on diplopia, enophthalmos, or procedure-related complications. Six observational studies with 273 orbits at a mean follow-up of 13 months were included. Three out of 4 studies reported significantly fewer patients with residual diplopia in the computer-assisted group, while only 1 of the 5 studies reported better improvement in enophthalmos in the assisted group. Types and incidence of complications were comparable. Study heterogeneities limiting statistical comparison by meta-analysis will be discussed. This review highlights the scarcity of data on computer-assisted technology in orbital reconstruction. The result suggests that computer-assisted technology may offer potential advantage in treating diplopia while its role remains to be confirmed in enophthalmos. Additional well-designed and powered randomized controlled trials are much needed.

  14. A Review of Research on Intercultural Learning through Computer-Based Digital Technologies

    Science.gov (United States)

    Çiftçi, Emrullah Yasin

    2016-01-01

    Intercultural communication is now a crucial part of our globalizing lives; however, not everyone has an opportunity to engage in an intercultural interaction with people from different cultures. Computer-based technologies are promising in creating environments for people to communicate with people from diverse cultures. This qualitative…

  15. Sscience & technology review; Science Technology Review

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-07-01

    This review is published ten times a year to communicate, to a broad audience, Lawrence Livermore National Laboratory`s scientific and technological accomplishments, particularly in the Laboratory`s core mission areas - global security, energy and the environment, and bioscience and biotechnology. This review for the month of July 1996 discusses: Frontiers of research in advanced computations, The multibeam Fabry-Perot velocimeter: Efficient measurement of high velocities, High-tech tools for the American textile industry, and Rock mechanics: can the Tuff take the stress.

  16. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  17. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  18. Bridging the gaps between mask inspection/review systems and actual wafer printability using computational metrology and inspection (CMI) technologies

    Science.gov (United States)

    Pang, Linyong; Tolani, Vikram; Satake, Masaki; Hu, Peter; Peng, Danping; Liu, Tingyang; Chen, Dongxue; Gleason, Bob; Vacca, Anthony

    2012-11-01

    Computational techniques have become increasingly important to improve resolution of optical lithography. Advanced computational lithography technologies, such as inverse lithography (ILT) and source mask optimization (SMO), are needed to print the most challenging layers, such as contact and metal, at the 20nm node and beyond. In order to deploy SMO and ILT into production, improvements and upgrades of mask manufacturing technology are required. These include writing, inspection, defect review, and repair. For example, mask plane inspection detects defect at highest resolution, but does not correlate accurately with scanner images. Aerial plane mask inspection and AIMSTM produce images close to those of a scanner, but except fot the latest AIMS-32TM, it does not have the flexibility needed to capture all the characteristics of free-form illumination. Advanced Computational Inspection and Metrology provides solutions to many of these issues.

  19. Computer-aided technology for fabricating complete dentures: systematic review of historical background, current status, and future perspectives.

    Science.gov (United States)

    Bidra, Avinash S; Taylor, Thomas D; Agar, John R

    2013-06-01

    Computer-aided technology is an emerging method for fabricating complete dentures. Consolidated information about historical background, current status, and scope for the future is lacking. The purpose of this systematic review was to analyze the existing literature on computer-aided technology for fabricating complete dentures and provide the reader with a historical background, current status, and future perspectives on this emerging technology. An electronic search of the English language literature between the periods of January 1957 and June 2012 was performed by using PubMed/MEDLINE with the following specific search terms: CAD-CAM complete dentures, digital complete dentures, computer dentures, designed dentures, machined dentures, manufactured dentures, milled dentures, and rapid prototyping dentures. Additionally, the search terms were used on the Google search engine to identify current commercial manufacturers and their protocols. A total of 1584 English language titles were obtained from the electronic database, and the systematic application of exclusion criteria resulted in the identification of 8 articles pertaining to computer-aided technology for complete dentures. Since the first published report in 1994, multiple authors have described different theoretical models and protocols for fabricating complete dentures with computer-aided technology. Although no clinical trials or clinical reports were identified in the scientific literature, the Google search engine identified 2 commercial manufacturers in the United States currently fabricating complete dentures with computer-aided design and computer-aided manufacturing (CAD/CAM) technology for clinicians world-wide. These manufacturers have definitive protocols in place and offer exclusive dental materials, techniques, and laboratory support. Their protocols contrast with conventional paradigms for fabricating complete dentures and allow the fabrication of complete dentures in 2 clinical appointments

  20. Technology reviews: Glazing systems

    Energy Technology Data Exchange (ETDEWEB)

    Schuman, J.; Rubinstein, F.; Papamichael, K.; Beltran, L.; Lee, E.S.; Selkowitz, S.

    1992-09-01

    We present a representative review of existing, emerging, and future technology options in each of five hardware and systems areas in envelope and lighting technologies: lighting systems, glazing systems, shading systems, daylighting optical systems, and dynamic curtain wall systems. The term technology is used here to describe any design choice for energy efficiency, ranging from individual components to more complex systems to general design strategies. The purpose of this task is to characterize the state of the art in envelope and lighting technologies in order to identify those with promise for advanced integrated systems, with an emphasis on California commercial buildings. For each technology category, the following activities have been attempted to the extent possible: Identify key performance characteristics and criteria for each technology; determine the performance range of available technologies; identify the most promising technologies and promising trends in technology advances; examine market forces and market trends; and develop a continuously growing in-house database to be used throughout the project. A variety of information sources have been used in these technology characterizations, including miscellaneous periodicals, manufacturer catalogs and cut sheets, other research documents, and data from previous computer simulations. We include these different sources in order to best show the type and variety of data available, however publication here does not imply our guarantee of these data. Within each category, several broad classes are identified, and within each class we examine the generic individual technologies that fag into that class.

  1. Technology reviews: Shading systems

    Energy Technology Data Exchange (ETDEWEB)

    Schuman, J.; Rubinstein, F.; Papamichael, K.; Beltran, L.; Lee, E.S.; Selkowitz, S.

    1992-09-01

    We present a representative review of existing, emerging, and future technology options in each of five hardware and systems areas in envelope and lighting technologies: lighting systems, glazing systems, shading systems, daylighting optical systems, and dynamic curtain wall systems. The term technology is used here to describe any design choice for energy efficiency, ranging from individual components to more complex systems to general design strategies. The purpose of this task is to characterize the state of the art in envelope and lighting technologies in order to identify those with promise for advanced integrated systems, with an emphasis on California commercial buildings. For each technology category, the following activities have been attempted to the extent possible: Identify key performance characteristics and criteria for each technology. Determine the performance range of available technologies. Identify the most promising technologies and promising trends in technology advances. Examine market forces and market trends. Develop a continuously growing in-house database to be used throughout the project. A variety of information sources have been used in these technology characterizations, including miscellaneous periodicals, manufacturer catalogs and cut sheets, other research documents, and data from previous computer simulations. We include these different sources in order to best show the type and variety of data available, however publication here does not imply our guarantee of these data. Within each category, several broad classes are identified, and within each class we examine the generic individual technologies that fall into that class.

  2. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Poggio, A.J. (ed.)

    1988-10-01

    This issue of Energy and Technology Review contains: Neutron Penumbral Imaging of Laser-Fusion Targets--using our new penumbral-imaging diagnostic, we have obtained the first images that can be used to measure directly the deuterium-tritium burn region in laser-driven fusion targets; Computed Tomography for Nondestructive Evaluation--various computed tomography systems and computational techniques are used in nondestructive evaluation; Three-Dimensional Image Analysis for Studying Nuclear Chromatin Structure--we have developed an optic-electronic system for acquiring cross-sectional views of cell nuclei, and computer codes to analyze these images and reconstruct the three-dimensional structures they represent; Imaging in the Nuclear Test Program--advanced techniques produce images of unprecedented detail and resolution from Nevada Test Site data; and Computational X-Ray Holography--visible-light experiments and numerically simulated holograms test our ideas about an x-ray microscope for biological research.

  3. Computational color technology

    CERN Document Server

    Kang, Henry R

    2006-01-01

    Henry Kang provides the fundamental color principles and mathematical tools to prepare the reader for a new era of color reproduction, and for subsequent applications in multispectral imaging, medical imaging, remote sensing, and machine vision. This book is intended to bridge the gap between color science and computational color technology, putting color adaptation, color constancy, color transforms, color display, and color rendition in the domain of vector-matrix representations and theories. Computational Color Technology deals with color digital images on the spectral level using vector-m

  4. Computer architecture technology trends

    CERN Document Server

    1991-01-01

    Please note this is a Short Discount publication. This year's edition of Computer Architecture Technology Trends analyses the trends which are taking place in the architecture of computing systems today. Due to the sheer number of different applications to which computers are being applied, there seems no end to the different adoptions which proliferate. There are, however, some underlying trends which appear. Decision makers should be aware of these trends when specifying architectures, particularly for future applications. This report is fully revised and updated and provides insight in

  5. Sscience & technology review

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    This monthly science and technology review features a report about Lawrence Livermore National Laboratory work on an awesome, inevitable, unpredictable, and potentially dangerous natural phenomenon, lightning. This feature article tells of the development of guidance by Laboratory engineers on how to deal with the effects of lightning on Department of Energy facilities, especially those where nuclear and high explosive materials are handled and stored. Other topics are Groundwater Modeling: More Cost Effective Cleanup by Design, Dual- Band Infrared Computed Tomography: Searching for Hidden Defects, and Plating Shop Moves to Finish Off Waste.

  6. Cooling Technology for Electronic Computers

    Science.gov (United States)

    Nakayama, Wataru

    The rapid growth of data processing speed in computers has been sustained by the advances in cooling technology. This article first presents a review of the published data of heat loads in recent Japanese large-scale computers. The survey indicates that, since around 1980, the high-level integration of microelectronic circuits has brought about almost four fold increase in the power dissipation from logic chips. The integration also has invited the evolutions of multichip modules and new schemes of electronic interconnections. Forced convection air-cooling and liquid cooling coupled with thermal connectors are discussed with reference to the designs employed in actual computers. More advanced cooling schemes are also discussed. Finally, the importance of thermal environmental control of computer rooms is emphasized.

  7. Computer Science and Technology Board

    Energy Technology Data Exchange (ETDEWEB)

    Blumenthal, M.S.

    1990-01-01

    The Computer Science and Technology Board (CSTB) meets three times a year to consider scientific and policy issues in computer science as well as relevant problems in associated technologies. The objectives of the Board include: initiating studies involving computer science and technology as a critical national resource; responding to requests from the government, nonprofit foundations, and industry for advice on computer science and technology; promoting the health of the technology and other fields of pure and applied science and technology; and providing a base of expertise within the NRC in the area of computer science and technology.

  8. Sudden Cardiac Risk Stratification with Electrocardiographic Indices - A Review on Computational Processing, Technology Transfer, and Scientific Evidence

    Directory of Open Access Journals (Sweden)

    Francisco Javier eGimeno-Blanes

    2016-03-01

    Full Text Available Great effort has been devoted in recent years to the development of sudden cardiac risk predictors as a function of electric cardiac signals, mainly obtained from the electrocardiogram (ECG analysis. But these prediction techniques are still seldom used in clinical practice, partly due to its limited diagnostic accuracy and to the lack of consensus about the appropriate computational signal processing implementation. This paper addresses a three-fold approach, based on ECG indexes, to structure this review on sudden cardiac risk stratification. First, throughout the computational techniques that had been widely proposed for obtaining these indexes in technical literature. Second, over the scientific evidence, that although is supported by observational clinical studies, they are not always representative enough. And third, via the limited technology transfer of academy-accepted algorithms, requiring further meditation for future systems. We focus on three families of ECG derived indexes which are tackled from the aforementioned viewpoints, namely, heart rate turbulence, heart rate variability, and T-wave alternans. In terms of computational algorithms, we still need clearer scientific evidence, standardizing, and benchmarking, siting on advanced algorithms applied over large and representative datasets. New scenarios like electronic health recordings, big data, long-term monitoring, and cloud databases, will eventually open new frameworks to foresee suitable new paradigms in the near future.

  9. Sudden Cardiac Risk Stratification with Electrocardiographic Indices - A Review on Computational Processing, Technology Transfer, and Scientific Evidence.

    Science.gov (United States)

    Gimeno-Blanes, Francisco J; Blanco-Velasco, Manuel; Barquero-Pérez, Óscar; García-Alberola, Arcadi; Rojo-Álvarez, José L

    2016-01-01

    Great effort has been devoted in recent years to the development of sudden cardiac risk predictors as a function of electric cardiac signals, mainly obtained from the electrocardiogram (ECG) analysis. But these prediction techniques are still seldom used in clinical practice, partly due to its limited diagnostic accuracy and to the lack of consensus about the appropriate computational signal processing implementation. This paper addresses a three-fold approach, based on ECG indices, to structure this review on sudden cardiac risk stratification. First, throughout the computational techniques that had been widely proposed for obtaining these indices in technical literature. Second, over the scientific evidence, that although is supported by observational clinical studies, they are not always representative enough. And third, via the limited technology transfer of academy-accepted algorithms, requiring further meditation for future systems. We focus on three families of ECG derived indices which are tackled from the aforementioned viewpoints, namely, heart rate turbulence (HRT), heart rate variability (HRV), and T-wave alternans. In terms of computational algorithms, we still need clearer scientific evidence, standardizing, and benchmarking, siting on advanced algorithms applied over large and representative datasets. New scenarios like electronic health recordings, big data, long-term monitoring, and cloud databases, will eventually open new frameworks to foresee suitable new paradigms in the near future.

  10. Science & Technology Review: September 2016

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, Ramona L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meissner, Caryn N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Chinn, Ken B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-09-30

    This is the September issue of the Lawrence Livermore National Laboratory's Science & Technology Review, which communicates, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. This month, there are features on "Laboratory Investments Drive Computational Advances" and "Laying the Groundwork for Extreme-Scale Computing." Research highlights include "Nuclear Data Moves into the 21st Century", "Peering into the Future of Lick Observatory", and "Facility Drives Hydrogen Vehicle Innovations."

  11. A Review On Cognitive Mismatch Between Computer and Information Technology And Physicians

    Directory of Open Access Journals (Sweden)

    Fozia Anwar

    2012-08-01

    Full Text Available Health Information Technology has a great potential to transform the existing health care systems by making them safe, effective and efficient. Multi-functionality and interoperability of health information systems are very important functions. Hence these features cannot be achieved without addressing the knowledge and skills of the health care personnel. There is a great mismatch between Information Technology knowledge and skills of physicians as this discipline is completely missing in their educational tenure. So usability of health information technologies and system as well as evidence based practice in the future can be improved by addressing this cognitive mismatch. This will result in persistent partnership in HIS design between physician and IT personnel to get maximum usibility of the systems,

  12. SLJ Special Section: Computer Technology and Libraries.

    Science.gov (United States)

    School Library Journal, 1984

    1984-01-01

    This 5-article section provides an annotated bibliography of 39 books about computer technology; describes peripheral equipment essential for building computer systems; suggests an approach to software evaluation and selection; describes the implementation of a computer program for elementary/secondary students and teachers; and reviews 34…

  13. CLOUD COMPUTING TECHNOLOGY TRENDS

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-05-01

    Full Text Available Cloud computing has been a tremendous innovation, through which applications became available online, accessible through an Internet connection and using any computing device (computer, smartphone or tablet. According to one of the most recent studies conducted in 2012 by Everest Group and Cloud Connect, 57% of companies said they already use SaaS application (Software as a Service, and 38% reported using standard tools PaaS (Platform as a Service. However, in the most cases, the users of these solutions highlighted the fact that one of the main obstacles in the development of this technology is the fact that, in cloud, the application is not available without an Internet connection. The new challenge of the cloud system has become now the offline, specifically accessing SaaS applications without being connected to the Internet. This topic is directly related to user productivity within companies as productivity growth is one of the key promises of cloud computing system applications transformation. The aim of this paper is the presentation of some important aspects related to the offline cloud system and regulatory trends in the European Union (EU.

  14. Computer Center: Software Review.

    Science.gov (United States)

    Duhrkopf, Richard, Ed.; Belshe, John F., Ed.

    1988-01-01

    Reviews a software package, "Mitosis-Meiosis," available for Apple II or IBM computers with colorgraphics capabilities. Describes the documentation, presentation and flexibility of the program. Rates the program based on graphics and usability in a biology classroom. (CW)

  15. 脑-机接口技术综述%Review of brain-computer interface technology

    Institute of Scientific and Technical Information of China (English)

    沈敏

    2007-01-01

    脑-机接口(brain computer interface,BCI)是在人脑与计算机或其它电子设备之间建立的直接的交流和控制通道,通过这种通道,人就可以直接通过脑来表达想法或操纵设备,而不需要语言或动作.脑-机接口是一种全新的通讯和控制技术.对脑-机接口技术的发展、研究现状、工作原理以及涉及的关键技术进行了较为详细地综述.

  16. Computer science and technologies

    Energy Technology Data Exchange (ETDEWEB)

    Kitagawa, T.

    1988-01-01

    This volume aims to provide up-to-date information on recent research and development in computer science and technology in Japan. In view of the rapid developments in these fields and the urgent demand for more detailed information about Japanese activities and achievements, it has been decided to concentrate on only a few selected topics in each volume. The topics covered will change each year so as to obtain adequate coverage of a broad range of activities over a period of a few years. This edition should not only contribute to the international understanding of technical developments in Japan, but also shed light on the cultural background to these theoretical and practical developments.

  17. Computer simulation technology in inertial confinement (ICF)

    Energy Technology Data Exchange (ETDEWEB)

    Yabe, Takashi (Gunma Univ., Kiryu (Japan). Faculty of Engineering)

    1994-12-01

    Recent development of computational technologies in inertial confinement fusion (ICF) is reviewed with a special emphasis on hydrodynamic simulations. The CIP method developed for ICF simulations is one of the typical examples that are used in various fields of physics such as variety of computational fluid dynamics, astrophysics, laser applications, geophysics, and so on. (author).

  18. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  19. Brain Computer Interfaces, a Review

    Science.gov (United States)

    Nicolas-Alonso, Luis Fernando; Gomez-Gil, Jaime

    2012-01-01

    A brain-computer interface (BCI) is a hardware and software communications system that permits cerebral activity alone to control computers or external devices. The immediate goal of BCI research is to provide communications capabilities to severely disabled people who are totally paralyzed or ‘locked in’ by neurological neuromuscular disorders, such as amyotrophic lateral sclerosis, brain stem stroke, or spinal cord injury. Here, we review the state-of-the-art of BCIs, looking at the different steps that form a standard BCI: signal acquisition, preprocessing or signal enhancement, feature extraction, classification and the control interface. We discuss their advantages, drawbacks, and latest advances, and we survey the numerous technologies reported in the scientific literature to design each step of a BCI. First, the review examines the neuroimaging modalities used in the signal acquisition step, each of which monitors a different functional brain activity such as electrical, magnetic or metabolic activity. Second, the review discusses different electrophysiological control signals that determine user intentions, which can be detected in brain activity. Third, the review includes some techniques used in the signal enhancement step to deal with the artifacts in the control signals and improve the performance. Fourth, the review studies some mathematic algorithms used in the feature extraction and classification steps which translate the information in the control signals into commands that operate a computer or other device. Finally, the review provides an overview of various BCI applications that control a range of devices. PMID:22438708

  20. Brain computer interfaces, a review.

    Science.gov (United States)

    Nicolas-Alonso, Luis Fernando; Gomez-Gil, Jaime

    2012-01-01

    A brain-computer interface (BCI) is a hardware and software communications system that permits cerebral activity alone to control computers or external devices. The immediate goal of BCI research is to provide communications capabilities to severely disabled people who are totally paralyzed or 'locked in' by neurological neuromuscular disorders, such as amyotrophic lateral sclerosis, brain stem stroke, or spinal cord injury. Here, we review the state-of-the-art of BCIs, looking at the different steps that form a standard BCI: signal acquisition, preprocessing or signal enhancement, feature extraction, classification and the control interface. We discuss their advantages, drawbacks, and latest advances, and we survey the numerous technologies reported in the scientific literature to design each step of a BCI. First, the review examines the neuroimaging modalities used in the signal acquisition step, each of which monitors a different functional brain activity such as electrical, magnetic or metabolic activity. Second, the review discusses different electrophysiological control signals that determine user intentions, which can be detected in brain activity. Third, the review includes some techniques used in the signal enhancement step to deal with the artifacts in the control signals and improve the performance. Fourth, the review studies some mathematic algorithms used in the feature extraction and classification steps which translate the information in the control signals into commands that operate a computer or other device. Finally, the review provides an overview of various BCI applications that control a range of devices.

  1. Brain Computer Interfaces, a Review

    Directory of Open Access Journals (Sweden)

    Luis Fernando Nicolas-Alonso

    2012-01-01

    Full Text Available A brain-computer interface (BCI is a hardware and software communications system that permits cerebral activity alone to control computers or external devices. The immediate goal of BCI research is to provide communications capabilities to severely disabled people who are totally paralyzed or ‘locked in’ by neurological neuromuscular disorders, such as amyotrophic lateral sclerosis, brain stem stroke, or spinal cord injury. Here, we review the state-of-the-art of BCIs, looking at the different steps that form a standard BCI: signal acquisition, preprocessing or signal enhancement, feature extraction, classification and the control interface. We discuss their advantages, drawbacks, and latest advances, and we survey the numerous technologies reported in the scientific literature to design each step of a BCI. First, the review examines the neuroimaging modalities used in the signal acquisition step, each of which monitors a different functional brain activity such as electrical, magnetic or metabolic activity. Second, the review discusses different electrophysiological control signals that determine user intentions, which can be detected in brain activity. Third, the review includes some techniques used in the signal enhancement step to deal with the artifacts in the control signals and improve the performance. Fourth, the review studies some mathematic algorithms used in the feature extraction and classification steps which translate the information in the control signals into commands that operate a computer or other device. Finally, the review provides an overview of various BCI applications that control a range of devices.

  2. [Earth Science Technology Office's Computational Technologies Project

    Science.gov (United States)

    Fischer, James (Technical Monitor); Merkey, Phillip

    2005-01-01

    This grant supported the effort to characterize the problem domain of the Earth Science Technology Office's Computational Technologies Project, to engage the Beowulf Cluster Computing Community as well as the High Performance Computing Research Community so that we can predict the applicability of said technologies to the scientific community represented by the CT project and formulate long term strategies to provide the computational resources necessary to attain the anticipated scientific objectives of the CT project. Specifically, the goal of the evaluation effort is to use the information gathered over the course of the Round-3 investigations to quantify the trends in scientific expectations, the algorithmic requirements and capabilities of high-performance computers to satisfy this anticipated need.

  3. Annual review of computer science

    Energy Technology Data Exchange (ETDEWEB)

    Traub, J.F. (Columbia Univ., New York, NY (USA)); Grosz, B.J. (Harvard Univ., Cambridge, MA (USA)); Lampson, B.W. (Digital Equipment Corp. (US)); Nilsson, N.J. (Stanford Univ., CA (USA))

    1988-01-01

    This book contains the annual review of computer science. Topics covered include: Database security, parallel algorithmic techniques for combinatorial computation, algebraic complexity theory, computer applications in manufacturing, and computational geometry.

  4. Understanding computer and information technology

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-15

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  5. Computer Technology and Nursing Education.

    Science.gov (United States)

    Southern Council on Collegiate Education for Nursing, Atlanta, GA.

    The influences of computer technology on college nursing education programs and health care delivery systems are discussed in eight papers. The use of computers is considered, with attention to clinical care, nursing education and continuing education, administration, and research. Attention is also directed to basic computer terminology, computer…

  6. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    1984-03-01

    The Lawrence Livermore National Laboratory publishes the Energy and Technology Review Monthly. This periodical reviews progress mode is selected programs at the laboratory. This issue includes articles on in-situ coal gasification, on chromosomal aberrations in human sperm, on high speed cell sorting and on supercomputers.

  7. Computers: Educational Technology Paradox?

    Science.gov (United States)

    Hashim, Hajah Rugayah Hj.; Mustapha, Wan Narita

    2005-01-01

    As we move further into the new millennium, the need to involve and adapt learners with new technology have been the main aim of many institutions of higher learning in Malaysia. The involvement of the government in huge technology-based projects like the Multimedia Super Corridor Highway (MSC) and one of its flagships, the Smart Schools have…

  8. Computer-assisted transoral surgery with flexible robotics and navigation technologies: a review of recent progress and research challenges.

    Science.gov (United States)

    Ren, Hongliang; Lim, Chwee Ming; Wang, Jiaole; Liu, Wei; Song, Shuang; Li, Zheng; Herbert, Geraint; Tse, Zion Tsz Ho; Tan, Zeqi

    2013-01-01

    This article reviews the flexible robotic surgery and navigation technologies that are currently available and under research development, in particular for transoral robotic surgery, in both broad and narrow senses. The clinical background, classifications, associated biomedical robotics applications, and surgical outcomes are illustrated in this new paradigm of minimally invasive surgery. The state-of-the-art robotic and navigation systems for transoral procedures are reviewed by identifying their key properties and considerations. The use of different materials and actuation methods by current robotic systems offers various movements for different purposes, and their characteristics are compared. The future research trends of robotic and navigation systems for transoral procedures are discussed in terms of emerging new material, actuation, and sensing technologies.

  9. Computer Technology for Industry

    Science.gov (United States)

    1982-01-01

    Shell Oil Company used a COSMIC program, called VISCEL to insure the accuracy of the company's new computer code for analyzing polymers, and chemical compounds. Shell reported that there were no other programs available that could provide the necessary calculations. Shell produces chemicals for plastic products used in the manufacture of automobiles, housewares, appliances, film, textiles, electronic equipment and furniture.

  10. Energy and Technology Review

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, W.A.; McElroy, L.; Wheatcraft, D.; Middleton, C.; Shang, S. [eds.

    1994-10-01

    Two articles are included: the industrial computing initiative, and artificial hip joints (applying weapons expertise to medical technology). Three research highlights (briefs) are included: KEN project (face recognition), modeling groundwater flow and chemical migration, and gas and oil national information infrastructure.

  11. Systematic review automation technologies

    Science.gov (United States)

    2014-01-01

    Systematic reviews, a cornerstone of evidence-based medicine, are not produced quickly enough to support clinical practice. The cost of production, availability of the requisite expertise and timeliness are often quoted as major contributors for the delay. This detailed survey of the state of the art of information systems designed to support or automate individual tasks in the systematic review, and in particular systematic reviews of randomized controlled clinical trials, reveals trends that see the convergence of several parallel research projects. We surveyed literature describing informatics systems that support or automate the processes of systematic review or each of the tasks of the systematic review. Several projects focus on automating, simplifying and/or streamlining specific tasks of the systematic review. Some tasks are already fully automated while others are still largely manual. In this review, we describe each task and the effect that its automation would have on the entire systematic review process, summarize the existing information system support for each task, and highlight where further research is needed for realizing automation for the task. Integration of the systems that automate systematic review tasks may lead to a revised systematic review workflow. We envisage the optimized workflow will lead to system in which each systematic review is described as a computer program that automatically retrieves relevant trials, appraises them, extracts and synthesizes data, evaluates the risk of bias, performs meta-analysis calculations, and produces a report in real time. PMID:25005128

  12. Ubiquitous Computing Technologies in Education

    Science.gov (United States)

    Hwang, Gwo-Jen; Wu, Ting-Ting; Chen, Yen-Jung

    2007-01-01

    The prosperous development of wireless communication and sensor technologies has attracted the attention of researchers from both computer and education fields. Various investigations have been made for applying the new technologies to education purposes, such that more active and adaptive learning activities can be conducted in the real world.…

  13. Energy and Technology Review

    Energy Technology Data Exchange (ETDEWEB)

    1982-09-01

    This is the first of two issues commemorating the 30th anniversary of the Lawrence Livermore National Laboratory. The early history of the laboratory is reviewed, including: the LLNL-Nevada organization; project Plowshare; the chemistry and materials science department; and development of computer systems. (GHT)

  14. Science & technology review

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-08-01

    This document is the August, 1995 issue of the Science and Technology review, a Lawrence Berkeley Laboratory publication. It contains two major articles, one on Scanning Tunneling Microscopy - as applied to materials engineering studies, and one on risk assessment, in this case looking primarily at a health care problem. Separate articles will be indexed from this journal to the energy database.

  15. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  16. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  17. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Brown, P.S. (ed.)

    1983-06-01

    Research activities at Lawrence Livermore National Laboratory are described in the Energy and Technology Review. This issue includes articles on measuring chromosome changes in people exposed to cigarette smoke, sloshing-ion experiments in the tandem mirror experiment, aluminum-air battery development, and a speech by Edward Teller on national defense. Abstracts of the first three have been prepared separately for the data base. (GHT)

  18. Book Review: Computational Topology

    DEFF Research Database (Denmark)

    Raussen, Martin

    2011-01-01

    Computational Topology by Herbert Edelsbrunner and John L. Harer. American Matheamtical Society, 2010 - ISBN 978-0-8218-4925-5......Computational Topology by Herbert Edelsbrunner and John L. Harer. American Matheamtical Society, 2010 - ISBN 978-0-8218-4925-5...

  19. Computer vision syndrome: A review.

    Science.gov (United States)

    Gowrisankaran, Sowjanya; Sheedy, James E

    2015-01-01

    Computer vision syndrome (CVS) is a collection of symptoms related to prolonged work at a computer display. This article reviews the current knowledge about the symptoms, related factors and treatment modalities for CVS. Relevant literature on CVS published during the past 65 years was analyzed. Symptoms reported by computer users are classified into internal ocular symptoms (strain and ache), external ocular symptoms (dryness, irritation, burning), visual symptoms (blur, double vision) and musculoskeletal symptoms (neck and shoulder pain). The major factors associated with CVS are either environmental (improper lighting, display position and viewing distance) and/or dependent on the user's visual abilities (uncorrected refractive error, oculomotor disorders and tear film abnormalities). Although the factors associated with CVS have been identified the physiological mechanisms that underlie CVS are not completely understood. Additionally, advances in technology have led to the increased use of hand-held devices, which might impose somewhat different visual challenges compared to desktop displays. Further research is required to better understand the physiological mechanisms underlying CVS and symptoms associated with the use of hand-held and stereoscopic displays.

  20. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  1. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    1983-10-01

    Three review articles are presented. The first describes the Lawrence Livermore Laboratory role in the research and development of oil-shale retorting technology through its studies of the relevant chemical and physical processes, mathematical models, and new retorting concepts. Second is a discussion of investigation of properties of dense molecular fluids at high pressures and temperatures to improve understanding of high-explosive behavior, giant-planet structure, and hydrodynamic shock interactions. Third, by totally computerizing the triple-quadrupole mass spectrometer system, the laboratory has produced a general-purpose instrument of unrivaled speed, selectivity, and adaptability for the analysis and identification of trace organic constituents in complex chemical mixtures. (GHT)

  2. Hybrid Nanoelectronics: Future of Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Wei Wang; Ming Liu; Andrew Hsu

    2006-01-01

    Nanotechnology may well prove to be the 21st century's new wave of scientific knowledge that transforms people's lives. Nanotechnology research activities are booming around the globe. This article reviews the recent progresses made on nanoelectronic research in US and China, and introduces several novel hybrid solutions specifically useful for future computer technology. These exciting new directions will lead to many future inventions, and have a huge impact to research communities and industries.

  3. Science & Technology Review March 2005

    Energy Technology Data Exchange (ETDEWEB)

    Henson, V E

    2005-01-25

    This issue of Science and Technology Review has the following articles: (1) Enhanced National Security through International Research Collaborations--Commentary by Stephen G. Cochran; (2) Building Networks of Trust through Collaborative Science--Livermore scientists are leading collaborative science and technology projects with colleagues from Central and South Asia and the Middle East; (3) Tracing the Steps in Nuclear Material Trafficking--The Laboratory.s nuclear science expertise is helping to thwart the illicit trafficking of nuclear material; (4) Looking at Earth in Action--Geophysicists at Livermore are using laboratory experiments to examine such issues as how best to store nuclear wastes and how to mitigate the effects of greenhouse gases; and (5) Gamma-Ray Bursts Shower the Universe with Metals--Computer models indicate that gamma-ray bursts from dying stars may be important sources of elements such as iron, zinc, titanium, and copper.

  4. Optical technologies for computational intelligence

    Science.gov (United States)

    Pavlov, Alexander V.

    2001-11-01

    Optics has a number of deep analogies with main principles of Computational Intelligence. We can see strong analogies between basic optical phenomena, used in Fourier-holography, and mathematical foundations of Fuzzy Set Theory. Also, analogies between optical holography technique and principles of Neural Networks Paradigm can be seen. Progress in new holographic recording media with self-developing property leads to Evolutionary Computations holographic realization. Based on these analogies we review holographic techniques from two points of view: Fuzzy Logic and Fuzzy relations.

  5. Energy technology review, July--August 1991

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, K.C. (ed.)

    1991-01-01

    This issue of Energy Technology Review'' gives the annual review of the programs at Lawrence Livermore National Laboratory. This State of the Laboratory issue includes discussions of all major programs: Defense Systems; Laser Research; Magnetic Fusion Energy; Energy and Earth Sciences; Environmental Technology Program; Biomedical and Environmental Science; Engineering; Physics; Chemistry and Materials Science; Computations; and Administrative and Institutional Services. An index is also given of the 1991 achievements with contact names and telephone number.

  6. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-01-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  7. Energy and Technology Review

    Energy Technology Data Exchange (ETDEWEB)

    Quirk, W.J. [ed.

    1993-08-01

    The Lawrence Livermore National Laboratory was established in 1952 to do research on nuclear weapons and magnetic fusion energy. Since then, we other major programs have been added including laser fusion, and laser isotope separation, biomedical and environmental science, strategic defense and applied energy technology. These programs, in turn, require research in basic scientific disciplines, including chemistry and materials science, computer science and technology, engineering and physics. In this issue, Herald Brown, the Laboratory`s third director and now counselor at the Center for Strategic and International Studies, reminisces about his years at Livermore and comments about the Laboratory`s role in the future. Also an article on visualizing dynamic systems in three dimensions is presented. Researchers can use our interactive algorithms to translate massive quantities of numerical data into visual form and can assign the visual markers of their choice to represent three- dimensional phenomena in a two-dimensional setting, such as a monitor screen. Major work has been done in the visualization of climate modeling, but the algorithms can be used for visualizing virtually any phenomena.

  8. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-12-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  9. Military engine computational structures technology

    Science.gov (United States)

    Thomson, Daniel E.

    1992-01-01

    Integrated High Performance Turbine Engine Technology Initiative (IHPTET) goals require a strong analytical base. Effective analysis of composite materials is critical to life analysis and structural optimization. Accurate life prediction for all material systems is critical. User friendly systems are also desirable. Post processing of results is very important. The IHPTET goal is to double turbine engine propulsion capability by the year 2003. Fifty percent of the goal will come from advanced materials and structures, the other 50 percent will come from increasing performance. Computer programs are listed.

  10. Science& Technology Review November 2003

    Energy Technology Data Exchange (ETDEWEB)

    McMahon, D

    2003-11-01

    This issue of Science & Technology Review covers the following topics: (1) We Will Always Need Basic Science--Commentary by Tomas Diaz de la Rubia; (2) When Semiconductors Go Nano--experiments and computer simulations reveal some surprising behavior of semiconductors at the nanoscale; (3) Retinal Prosthesis Provides Hope for Restoring Sight--A microelectrode array is being developed for a retinal prosthesis; (4) Maglev on the Development Track for Urban Transportation--Inductrack, a Livermore concept to levitate train cars using permanent magnets, will be demonstrated on a 120-meter-long test track; and (5) Power Plant on a Chip Moves Closer to Reality--Laboratory-designed fuel processor gives power boost to dime-size fuel cell.

  11. A Review of the Brain - computer Interface Technology%脑-机接口技术研究概况

    Institute of Scientific and Technical Information of China (English)

    赵慧; 李远清

    2006-01-01

    脑-机接口(BCI-Brain-Computer Interface)是一种全新的通讯和控制技术.首先介绍BCI的定义和工作原理;从输入信号的类型选择、预处理、特征的提取、分类方法等方面论述了BCI系统设计中的关键技术;最后对BCI的应用及在未来的发展作了介绍.

  12. 脑机接口技术研究概述%A Review of Brain-Computer Interface Technology

    Institute of Scientific and Technical Information of China (English)

    朱文明; 高诺

    2008-01-01

    脑机接口(Brain-Computer Interface, BCI)是在人脑和外界之间建立不依赖于常规大脑信息输出通路(外周神经和肌肉组织)的一种通讯系统.本文概述了基于脑电信号(EEG)的BCI技术的基本原理、研究方法、类型、研究现状,并分析了目前存在的问题与应用前景.

  13. Contribution of the Computer Technologies in the Teaching of Physics: Critical Review and Conception of an Interactive Simulation Software

    Directory of Open Access Journals (Sweden)

    Louis Trudel

    2013-08-01

    Full Text Available In the present research, we will synthesize the main research results about the development of interactive computer environments for physics teaching and learning. We will see that few types of software propose environments that take into account the user's erroneous representations in order to make him become aware of his mistakes. The majority of these softwares present modelling activities that are restricted to the automatic collection of experimental data and their analysis under graphical form. As a consequence, we will present the design of computer environments for the learning of the phenomenona of absorption and diffusion of light which will take into account the user's initial representations. The design of these environments is divided in five steps: (1 diagnostic of the user’s initial representations; (2 confrontation of the user’s initial representations by the simulation; (3 reconstruction by the user of his representations following the completion by the user of the simulation; (4 reconstruction of the user’s representations following the presentation by the software of scientific information related to the case studied and (5 assessment of the current state of understanding of the user by the software.

  14. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  15. Brain computer interface technology research review%脑机接口技术研究综述

    Institute of Scientific and Technical Information of China (English)

    李勃

    2013-01-01

    脑机接口技术(brain computer interface,BCI)不依赖于常规大脑信息输出通路,该技术建立了一种直接的信息交流和控制通道,为人脑和外界之间提供了一种全新的交互方式.简要介绍了BCI技术的定义和基本组成及发展现状,并对皮层慢电位、视觉诱发电位、眼动产生的α波、P300电位和基于运动想象的μ节律及β波5种脑机接口技术的研究方向作了简要阐述,最后指出目前BCI研究面临的挑战及未来的应用前景.

  16. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Quirk, W.J.; Canada, J.; de Vore, L.; Gleason, K.; Kirvel, R.D.; Kroopnick, H.; McElroy, L.

    1994-04-01

    This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.

  17. Science& Technology Review October 2002

    Energy Technology Data Exchange (ETDEWEB)

    Budil, K S

    2002-10-01

    The October 2002 issue of Science and Technology Review has the following articles: (1) Applied Science Is a Hallmark of This Laboratory--Commentary by Hal Graboske. (2) Sending Up Signals for Genetic Variation--In situ rolling circle amplification promises to advance the detection and treatment of cancer and other diseases. (3) SiMM Is Anything But Simple--Modules of silicon microchannels and microlenses result in the smallest, most powerful, and least expensive laser diode pumps ever. (4) World's Most Powerful Solid-State Laser--A new design allows tremendous scaling up of solid-state laser power. (5) Stepping Up to Extreme Lithography--The next generation of computer chips can now be produced on a commercial scale. (6) Relief for Acute and Chronic Pain--New technology turns an ancient pain management method into a modern medical tool. (7)50th Anniversary Highlight--14 Energy and Environment: Understanding Our World--The Laboratory's energy and environmental research is an important adjunct to its core national security mission.

  18. Science& Technology Review October 2003

    Energy Technology Data Exchange (ETDEWEB)

    McMahon, D H

    2003-10-01

    The October 2003 issue of Science & Technology Review consists of the following articles: (1) Award-Winning Technologies from Collaborative Efforts--Commentary by Hal Graboske; (2) BASIS Counters Airborne Bioterrorism--The Biological Aerosol Sentry and Information System is the first integrated biodefense system; (3) In the Chips for the Coming Decade--A new system is the first full-field lithography tool for use at extreme ultraviolet wavelengths; (4) Smoothing the Way to Print the Next Generation of Computer Chips--With ion-beam thin-film planarization, the reticles and projection optics made for extreme ultraviolet lithography are nearly defect-free; (5) Eyes Can See Clearly Now--The MEMS-based adaptive optics phoropter improves the process of measuring and correcting eyesight aberrations; (6) This Switch Takes the Heat--A thermally compensated Q-switch reduces the light leakage on high-average-power lasers; (7) Laser Process Forms Thick, Curved Metal Parts--A new process shapes parts to exact specifications, improving their resistance to fatigue and corrosion cracking; and (8) Characterizing Tiny Objects without Damaging Them--Livermore researchers are developing nondestructive techniques to probe the Lilliputian world of mesoscale objects.

  19. Energy management programs - computer technology, a tool

    Energy Technology Data Exchange (ETDEWEB)

    Perron, G

    1996-08-01

    Energy management systems were defined and reviewed, focusing on how the development in computer technology has impacted on the development of energy management systems. It was shown that the rise of micro-computer systems made it possible to create a tool that is well adapted to the urgent need for optimizing electromechanical systems to meet energy reduction criteria while still maintaining occupant comfort. Two case studies were cited to show the kind of savings realized by the different energy management systems installed. Besides managing energy, energy management systems can also help in detecting certain operating failures or irregularities in equipment configurations, monitoring and measuring energy consumption, as well as performing such peripherally related functions as gathering data about operating and space temperatures.

  20. Redesigning educational peer review interactions using computer tools: An introduction

    Directory of Open Access Journals (Sweden)

    Ilya M. Goldin, Kevin D. Ashley & Christian D. Schunn

    2012-11-01

    Full Text Available Peer review is a family of instructional techniques. Historically, these have been employed in writing and many other educational domains. Modern computer technologies facilitate the use of peer review, which is especially relevant to educational settings where it is not practical to administer peer review manually. The use of computer support for peer review has shed light on many important scientific questions, some of which we summarize. These findings set the context for the papers in this special issue, which demonstrate how computer support for peer review enables research on peer review itself and on its pedagogical significance.

  1. Review of Residential Ventilation Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Armin Rudd

    2005-08-30

    This paper reviews current and potential ventilation technologies for residential buildings, including a variety of mechanical systems, natural ventilation, and passive ventilation. with particular emphasis on North American climates and construction.

  2. Use of computer technology by the elderly

    OpenAIRE

    Akkan, Sultan

    1993-01-01

    The information technology that is available now has been developed for other populations, such as the general public, the business community, health care organizations, or the handicapped. However, much of it can be adapted to fit the needs, desires and capabilities of the elderly and computer technology can be much "friendlier" for the elderly in both a technological and a social sense. This study examines the elderly-computer technology interface. State-of -the-art co...

  3. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Stowers, I.F.; Crawford, R.B.; Esser, M.A.; Lien, P.L.; O' Neal, E.; Van Dyke, P. (eds.)

    1982-07-01

    The state of the laboratory address by LLNL Director Roger Batzel is summarized, and a breakdown of the laboratory funding is given. The Livermore defense-related committment is described, including the design and development of advanced nuclear weapons as well as research in inertial confinement fusion, nonnuclear ordnance, and particle beam technology. LLNL is also applying its scientific and engineering resources to the dual challenge of meeting future energy needs without degrading the quality of the biosphere. Some representative examples are given of the supporting groups vital for providing the specialized expertise and new technologies required by the laboratory's major research programs. (GHT)

  4. Energy and Technology Review

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, W.A.; Quirk, W.J. [eds.

    1994-06-01

    This report discusses: The Clementine satellite, the first US satellite to the Moon in more than two decades, sent back more than 1.5 million images of the lunar surface using cameras designed and calibrated by LLNL. An LLNL-developed laser ranger provided information that will be used to construct a relief map of the Moon`s surface; and Uncertainty and the Federal Role in Science and Technology, Ralph E. Gomory was a recent participate in the Director`s Distinguished Lecturer Series at LLNL. In his lecture, he addressed some of the tensions, conflicts, and possible goals related to federal support for science and technology.

  5. Energy and Technology Review

    Energy Technology Data Exchange (ETDEWEB)

    1983-03-01

    This journal contains 7 articles pertaining to astrophysics. The first article is an overview of the other 6 articles and also a tribute to Jim Wilson and his work in the fields of general relativity and numerical astrophysics. The six articles are on the following subjects: (1) computer simulations of black hole accretion; (2) calculations on the collapse of the iron core of a massive star; (3) stellar-collapse models which reveal a possible site for nucleosynthesis of elements heavier than iron; (4) modeling sources for gravitational radiation; (5) the development of a computer program for finite-difference mesh calculations and its applications to astrophysics; (6) the existence of neutrinos with nonzero rest mass are used to explain the universe. Abstracts of each of the articles were prepared separately. (SC)

  6. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Carr, R.B.; Bathgate, M.B.; Crawford, R.B.; McCaleb, C.S.; Prono, J.K. (eds.)

    1976-05-01

    The chief objective of LLL's biomedical and environmental research program is to enlarge mankind's understanding of the implications of energy-related chemical and radioactive effluents in the biosphere. The effluents are studied at their sources, during transport through the environment, and at impact on critical resources, important ecosystems, and man himself. We are pursuing several projects to acquire such knowledge in time to guide the development of energy technologies toward safe, reasonable, and optimal choices.

  7. Computer Technology-Infused Learning Enhancement

    Science.gov (United States)

    Keengwe, Jared; Anyanwu, Longy O.

    2007-01-01

    The purpose of the study was to determine students' perception of instructional integration of computer technology to improve learning. Two key questions were investigated in this study: (a) What is the students' perception of faculty integration of computer technology into classroom instruction? (b) To what extent does the students' perception of…

  8. College Students' Attitude towards Computer Technology

    Science.gov (United States)

    Njagi, K. O.; Havice, W. L.

    2011-01-01

    Recent advances in the contemporary world, especially in the area of computer technology, have heralded the development and implementation of new and innovative teaching strategies and particularly with the Internet revolution. This study assessed students' attitude towards computer technology. Specifically, the study assessed differences in…

  9. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  10. Advanced Hybrid Computer Systems. Software Technology.

    Science.gov (United States)

    This software technology final report evaluates advances made in Advanced Hybrid Computer System software technology . The report describes what...automatic patching software is available as well as which analog/hybrid programming languages would be most feasible for the Advanced Hybrid Computer...compiler software . The problem of how software would interface with the hybrid system is also presented.

  11. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  12. A Technology Assessment of Personal Computers. Vol. II: Personal Computer Technology, Users, and Uses.

    Science.gov (United States)

    Nilles, Jack M.

    This volume reports on the initial phase of a technology assessment of personal computers. First, technological developments that will influence the rate of diffusion of personal computer technology among the general populace are examined. Then the probable market for personal computers is estimated and analyzed on a functional basis, segregating…

  13. Future Computing Technology (2/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the second day of the Future Computing Technology series, we will talk about ubiquitous computing. From smart watches through mobile devices to virtual reality, computing devices surround us, and innovative new technologies are introduces every day. We will briefly explore how this propagation might continue, how computers can take ove...

  14. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    OpenAIRE

    Gorbunova Irina B.

    2012-01-01

    The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music...

  15. Art Therapists and Computer Technology

    Science.gov (United States)

    Peterson, Brent C.; Stovall, Kay; Elkins, David E.; Parker-Bell, Barbara

    2005-01-01

    The purpose of this study was to understand the impact of technology on art therapists by exploring how art therapists own and use technology and to determine barriers to ownership and use. A survey was conducted at the 2002 annual conference of the American Art Therapy Association in Washington, DC. Of the 250 surveys distributed, 195 were…

  16. Impact of new computing systems on computational mechanics and flight-vehicle structures technology

    Science.gov (United States)

    Noor, A. K.; Storaasli, O. O.; Fulton, R. E.

    1984-01-01

    Advances in computer technology which may have an impact on computational mechanics and flight vehicle structures technology were reviewed. The characteristics of supersystems, highly parallel systems, and small systems are summarized. The interrelations of numerical algorithms and software with parallel architectures are discussed. A scenario for future hardware/software environment and engineering analysis systems is presented. Research areas with potential for improving the effectiveness of analysis methods in the new environment are identified.

  17. Lighting Computer Programs in Lighting Technology

    OpenAIRE

    Ekren, Nazmi; Dursun, Bahtiyar; Ercan AYKUT

    2008-01-01

    It is well known that the computer in lighting technology is a vital component for lighting designers. Lighting computer programs are preferred in preparing architectural projects in lighting techniques, especially in lighting calculations. Lighting computer programs, which arise with the aim of helping lighting designers, gain more interest day by day. The most important property of lighting computer programs is the ability to enable the simulation of lighting projects without requiring any ...

  18. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  19. Science& Technology Review June 2003

    Energy Technology Data Exchange (ETDEWEB)

    McMahon, D

    2003-06-01

    This month's issue has the following articles: (1) Livermore's Three-Pronged Strategy for High-Performance Computing, Commentary by Dona Crawford; (2) Riding the Waves of Supercomputing Technology--Livermore's Computation Directorate is exploiting multiple technologies to ensure high-performance, cost-effective computing; (3) Chromosome 19 and Lawrence Livermore Form a Long-Lasting Bond--Lawrence Livermore biomedical scientists have played an important role in the Human Genome Project through their long-term research on chromosome 19; (4) A New Way to Measure the Mass of Stars--For the first time, scientists have determined the mass of a star in isolation from other celestial bodies; and (5) Flexibly Fueled Storage Tank Brings Hydrogen-Powered Cars Closer to Reality--Livermore's cryogenic hydrogen fuel storage tank for passenger cars of the future can accommodate three forms of hydrogen fuel separately or in combination.

  20. Science & Technology Review June 2016

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, Ramona L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Chinn, Ken B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kotta, Paul [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meissner, Caryn N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-06-01

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  1. Science & Technology Review June 2007

    Energy Technology Data Exchange (ETDEWEB)

    Chinn, D J

    2007-04-30

    Lawrence Livermore National Laboratory is operated by the University of California for the Department of Energy's National Nuclear Security Administration. At Livermore, we focus science and technology on ensuring our nation's security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published 10 times a year to communicate, to a broad audience, the Laboratory's scientific and technological accomplishments in fulfilling its primary missions. The publication's goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  2. 9th International Conference on Advanced Computing & Communication Technologies

    CERN Document Server

    Mandal, Jyotsna; Auluck, Nitin; Nagarajaram, H

    2016-01-01

    This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27–29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

  3. Security Issues in Cloud Computing - A Review

    Directory of Open Access Journals (Sweden)

    Irfan Hussain

    2014-09-01

    Full Text Available Cloud Computing is the most emerging trend in Information Technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are the big challenges of privacy and security. In this paper, a review of different security issues like trust, confidentiality, authenticity, encryption, key management and resource sharing are presented along with the efforts made on how to overcome these issues.

  4. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  5. Foundry Coating Technology: A Review

    DEFF Research Database (Denmark)

    Nwaogu, Ugochukwu Chibuzoh; Tiedje, Niels Skat

    2011-01-01

    is important. In this review, a detailed description of these topics and examples are provided where necessary. A potential area of research in foundry coating development, using sol-gel process is suggested. The application of sol-gel technology in the development of foundry coatings is a novel approach....

  6. Computer Programming Projects in Technology Courses.

    Science.gov (United States)

    Thomas, Charles R.

    1985-01-01

    Discusses programming projects in applied technology courses, examining documentation, formal reports, and implementation. Includes recommendations based on experience with a sophomore machine elements course which provided computers for problem solving exercises. (DH)

  7. Computer Technology in Construction Project Management

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    Today, the network information has become a trend al of the industries have to face. For the construction project management, we must fuly master the use of computer information technology, mining its intrinsic value, so that it can promote the construction industry to meet the requirements of the times. This paper demonstrates the main application of computer technology in construction project management in a brief analysis.

  8. Computer technology forecast study for general aviation

    Science.gov (United States)

    Seacord, C. L.; Vaughn, D.

    1976-01-01

    A multi-year, multi-faceted program is underway to investigate and develop potential improvements in airframes, engines, and avionics for general aviation aircraft. The objective of this study was to assemble information that will allow the government to assess the trends in computer and computer/operator interface technology that may have application to general aviation in the 1980's and beyond. The current state of the art of computer hardware is assessed, technical developments in computer hardware are predicted, and nonaviation large volume users of computer hardware are identified.

  9. Computer science research and technology volume 3

    CERN Document Server

    Bauer, Janice P

    2011-01-01

    This book presents leading-edge research from across the globe in the field of computer science research, technology and applications. Each contribution has been carefully selected for inclusion based on the significance of the research to this fast-moving and diverse field. Some topics included are: network topology; agile programming; virtualization; and reconfigurable computing.

  10. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip; Soraker, Johnny Hartz

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions th

  11. Technological Enhancements for Personal Computers

    Science.gov (United States)

    1992-03-01

    scenarios that represent some of what can be accomplished % ith personal computers. 20 D!STRIBUTION/ AVAILABILTY OF ABSTRACT 21 ABSTRACT SECURITY...not just the immediate usages . With few exceptions all of the options discussed here are available under the Desktop III contract. The new Desktop IV...Many users found them to be slow and unwieldy and consequentially they did not get the expected usage nor did they provide the advantages we find in

  12. Science & Technology Review October 2007

    Energy Technology Data Exchange (ETDEWEB)

    Chinn, D J

    2007-08-21

    Livermore researchers won five R&D 100 awards in R&D Magazine's annual competition for the top 100 industrial innovations worldwide. This issue of Science & Technology Review highlights the award-winning technologies: noninvasive pneumothorax detector, microelectromechanical system-based adaptive optics scanning laser ophthalmoscope, large-area imager, hyper library of linear solvers, and continuous-phase-plate optics system manufactured using magnetorheological finishing. Since 1978, Laboratory researchers have received 118 R&D 100 awards. The R&D 100 logo (on the cover and p 1) is reprinted courtesy of R&D Magazine.

  13. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    Directory of Open Access Journals (Sweden)

    Gorbunova Irina B.

    2012-12-01

    Full Text Available The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music teachers is through basic educational programs of vocational training, supplementary education, professional development of teachers and methodical support via Internet. In addition, the laboratory Music & Computer Technologies engaged in scientific activity: it is, above all, specialized researches in the field of pedagogy and international conferences.

  14. Computational protein design: a review

    Science.gov (United States)

    Coluzza, Ivan

    2017-04-01

    Proteins are one of the most versatile modular assembling systems in nature. Experimentally, more than 110 000 protein structures have been identified and more are deposited every day in the Protein Data Bank. Such an enormous structural variety is to a first approximation controlled by the sequence of amino acids along the peptide chain of each protein. Understanding how the structural and functional properties of the target can be encoded in this sequence is the main objective of protein design. Unfortunately, rational protein design remains one of the major challenges across the disciplines of biology, physics and chemistry. The implications of solving this problem are enormous and branch into materials science, drug design, evolution and even cryptography. For instance, in the field of drug design an effective computational method to design protein-based ligands for biological targets such as viruses, bacteria or tumour cells, could give a significant boost to the development of new therapies with reduced side effects. In materials science, self-assembly is a highly desired property and soon artificial proteins could represent a new class of designable self-assembling materials. The scope of this review is to describe the state of the art in computational protein design methods and give the reader an outline of what developments could be expected in the near future.

  15. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  16. Voice Technology Using Personal Computers.

    Science.gov (United States)

    1987-01-01

    PROGRA -.. NDC -A85 -AiSG 743 VOICE TECNOLOGY USING PERSONAL COMPUTE3SI(U) alit FORCE 212 INST OF TECH MRIGJ4T-PATTERSON RFB ON G L TALBOT 1987...Inline( $2E/$C6/$06/ Int24Err $Ol/$50/$89/$F8/$2E/$A2/ Int24ErrCode /$58/$BO/$OO/$89/$EC/$5D/$CF); - 150 - i..r - l. .. { Turbo: PUSH BP save...caller’s stack frame MOV BP,SP Set up this procedure’s stack frame PUSH BP ? Inline: MOV BYTE CS:[INT24Err],I Set INT24Err to True PUSH AX MOV AX,DI Get INT

  17. Gesture Recognition Technology: A Review

    Directory of Open Access Journals (Sweden)

    PALLAVI HALARNKAR

    2012-11-01

    Full Text Available Gesture Recognition Technology has evolved greatly over the years. The past has seen the contemporary Human – Computer Interface techniques and their drawbacks, which limit the speed and naturalness of the human brain and body. As a result gesture recognition technology has developed since the early 1900s with a view to achieving ease and lessening the dependence on devices like keyboards, mice and touchscreens. Attempts have been made to combine natural gestures to operate with the technology around us to enable us to make optimum use of our body gestures making our work faster and more human friendly. The present has seen huge development in this field ranging from devices like virtual keyboards, video game controllers to advanced security systems which work on face, hand and body recognition techniques. The goal is to make full use of themovements of the body and every angle made by the parts of the body in order to supplement technology to become human friendly and understand natural human behavior and gestures. The future of this technology is very bright with prototypes of amazing devices in research and development to make the world equipped with digital information at hand whenever and wherever required.

  18. Future Computing Technology (3/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the third day of the Future Computing Technology series, we will touch on societal aspects of the future of computing. Our perception of computers may at time seem passive, but in reality we are a vital chain of the feedback loop. Human-computer interaction, innovative forms of computers, privacy, process automation, threats and medica...

  19. Ultimate computing. Biomolecular consciousness and nano Technology

    Energy Technology Data Exchange (ETDEWEB)

    Hameroff, S.R.

    1987-01-01

    The book advances the premise that the cytoskeleton is the cell's nervous system, the biological controller/computer. If indeed cytoskeletal dynamics in the nanoscale (billionth meter, billionth second) are the texture of intracellular information processing, emerging ''NanoTechnologies'' (scanning tunneling microscopy, Feynman machines, von Neumann replicators, etc.) should enable direct monitoring, decoding and interfacing between biological and technological information devices. This in turn could result in important biomedical applications and perhaps a merger of mind and machine: Ultimate Computing.

  20. Mathematics for engineering, technology and computing science

    CERN Document Server

    Martin, Hedley G

    1970-01-01

    Mathematics for Engineering, Technology and Computing Science is a text on mathematics for courses in engineering, technology, and computing science. It covers linear algebra, ordinary differential equations, and vector analysis, together with line and multiple integrals. This book consists of eight chapters and begins with a discussion on determinants and linear equations, with emphasis on how the value of a determinant is defined and how it may be obtained. Solution of linear equations and the dependence between linear equations are also considered. The next chapter introduces the reader to

  1. Emerging Technologies Landscape on Education. A review

    Directory of Open Access Journals (Sweden)

    Luis de la Fuente Valentin

    2013-09-01

    Full Text Available This paper presents a desk research that analysed available recent studies in the field of Technology Enhanced Learning. The desk research is focused on work produced in the frame of FP6 and FP7 European programs, in the area of Information and Communication Technologies. It concentrates in technologies that support existing forms of learning, and also in technologies that enhance new learning paradigms. This approach includes already adopted and successfully piloted technologies. The elaboration of the desk research had three main parts: firstly, the collection of documents from CORDIS and other institutions related to TEL research; secondly, the identification of relevant terms appearing in those documents and the elaboration of a thesaurus; and thirdly, a quantitative analysis of each term occurrences. Many of the identified technologies belong to the fields of interactive multimedia, Human-computer Interaction and-or related to recommendation and learning analytics. This study becomes a thorough review of the current state of these fields through the actual development of R&D European projects. This research, will be used as a basis to better understand the evolution of the sector, and to focus future research efforts on these sectors and their application to education.

  2. Computer technology in oil refining: cost or benefit

    Energy Technology Data Exchange (ETDEWEB)

    Payne, B. (KBC Process Technology (GB))

    1990-04-01

    There is undoubtedly a commitment in the oil refining industry to computerise wherever possible, and to develop advanced mathematical modelling techniques to improved profitability. However, many oil refiners are now asking themselves whether computer solutions are a cost, or are truly a benefit to their organisation. Problems have been caused by distributed computing running out of control in many organisations. This has been partly brought to reign recently, by advanced networking of PCs along with mainframe facilities, and development of management information systems with common data bases for all users to build their applications on. Implementation of information technology strategies helped many refiners to plan the way ahead for the future. The use of computers across the refining sector in the current marketplace is reviewed. The conclusion drawn is that although computer technology is a cost it can also be ranked as a significant benefit and success in the refining industry at present. (author).

  3. Existential Computer Anxiety and Changes in Computer Technology: What Past Research on Computer Anxiety Has Missed.

    Science.gov (United States)

    Worthington, Valerie L.; Zhao, Yong

    1999-01-01

    Proposes that the existing literature on computer anxiety has neglected to consider two issues: (1) that there is an existential element to computer anxiety, and (2) that computer technology has undergone historical changes that bring with them subsequent changes in the metaphors used to understand computers. (Contains 72 references.) (Author/LRW)

  4. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  5. A review of computer-assisted assessment

    Directory of Open Access Journals (Sweden)

    Gráinne Conole

    2005-12-01

    Full Text Available Pressure for better measurement of stated learning outcomes has resulted in a demand for more frequent assessment. The resources available are seen to be static or dwindling, but Information and Communications Technology is seen to increase productivity by automating assessment tasks. This paper reviews computer-assisted assessment (CAA and suggests future developments. A search was conducted of CAA-related literature from the past decade to trace the development of CAA from the beginnings of its large-scale use in higher education. Lack of resources, individual inertia and risk propensity are key barriers for individual academics, while proper resourcing and cultural factors outweigh technical barriers at the institutional level.

  6. REVIEW: X-ray computed tomography

    Science.gov (United States)

    Kalender, Willi A.

    2006-07-01

    X-ray computed tomography (CT), introduced into clinical practice in 1972, was the first of the modern slice-imaging modalities. To reconstruct images mathematically from measured data and to display and to archive them in digital form was a novelty then and is commonplace today. CT has shown a steady upward trend with respect to technology, performance and clinical use independent of predictions and expert assessments which forecast in the 1980s that it would be completely replaced by magnetic resonance imaging. CT not only survived but exhibited a true renaissance due to the introduction of spiral scanning which meant the transition from slice-by-slice imaging to true volume imaging. Complemented by the introduction of array detector technology in the 1990s, CT today allows imaging of whole organs or the whole body in 5 to 20 s with sub-millimetre isotropic resolution. This review of CT will proceed in chronological order focussing on technology, image quality and clinical applications. In its final part it will also briefly allude to novel uses of CT such as dual-source CT, C-arm flat-panel-detector CT and micro-CT. At present CT possibly exhibits a higher innovation rate than ever before. In consequence the topical and most recent developments will receive the greatest attention.

  7. The Computer as Doorstop: Technology as Disempowerment.

    Science.gov (United States)

    Callister, Thomas A., Jr.; Dunne, Faith

    1992-01-01

    Efforts to replace teachers with technology have uniformly failed. Machines are only tools. Good classroom tools extend the teacher's power to create a rich learning environment. If the teacher perceives the tool as master or misconstrues its use, its potential will never be realized. Strategies for computer use must focus on purpose and derive…

  8. Competency Index. [Business/Computer Technologies Cluster.

    Science.gov (United States)

    Ohio State Univ., Columbus. Center on Education and Training for Employment.

    This index allows the user to scan the competencies under each title for the 28 subjects appropriate for use in a competency list for the 12 occupations within the business/computer technologies cluster. Titles of the 28 units are as follows: employability skills; professionalism; teamwork; professional and ethical standards; economic and business…

  9. 2nd International Conference on Computer and Communication Technologies

    CERN Document Server

    Raju, K; Mandal, Jyotsna; Bhateja, Vikrant

    2016-01-01

    The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the te...

  10. Towards Pervasive Computing in Individual Care: A Literature Review

    Directory of Open Access Journals (Sweden)

    Sonali Goel

    2015-11-01

    Full Text Available Pervasive Computing is a concept which deals with increasingly ubiquitous, connected computing devices in an environment where the convergence of advanced electronic and particularly wireless technologies and the Internet takes place. Supported self-care and home-based services are emerging as new models of care. Advances in sensor and network technologies have made these possible [4]. A smart home equipped with smart technologies provides services that enhance human way of living i.e. safety, security, entertainment etc. allowing elderly to maintain living independently and securely in their homes. This paper reviews various topics on smart home technologies including smart home network, smart home appliances, smart home projects and sensor technologies for smart home. In this paper, we are analyzing the parameters on which work has already been done and introducing some new parameters on which potential work needs to be done to progress in smart technologies.

  11. Computer technology applications in industrial and organizational psychology.

    Science.gov (United States)

    Crespin, Timothy R; Austin, James T

    2002-08-01

    This article reviews computer applications developed and utilized by industrial-organizational (I-O) psychologists, both in practice and in research. A primary emphasis is on applications developed for Internet usage, because this "network of networks" changes the way I-O psychologists work. The review focuses on traditional and emerging topics in I-O psychology. The first topic involves information technology applications in measurement, defined broadly across levels of analysis (persons, groups, organizations) and domains (abilities, personality, attitudes). Discussion then focuses on individual learning at work, both in formal training and in coping with continual automation of work. A section on job analysis follows, illustrating the role of computers and the Internet in studying jobs. Shifting focus to the group level of analysis, we briefly review how information technology is being used to understand and support cooperative work. Finally, special emphasis is given to the emerging "third discipline" in I-O psychology research-computational modeling of behavioral events in organizations. Throughout this review, themes of innovation and dissemination underlie a continuum between research and practice. The review concludes by setting a framework for I-O psychology in a computerized and networked world.

  12. A New Advance in Intelligent Computing Technology

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ A recent study by Dr. HUANG Deshuang and his colleagues from the CAS Hefei Institute of Intelligent Machines has shed new light on the development of digital image processing technology. Their work was reported as a cover story in the July issue of the Digital Signal Processing: A Review Journal.

  13. Computer vision syndrome: a review.

    Science.gov (United States)

    Blehm, Clayton; Vishnu, Seema; Khattak, Ashbala; Mitra, Shrabanee; Yee, Richard W

    2005-01-01

    As computers become part of our everyday life, more and more people are experiencing a variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation, redness, blurred vision, and double vision, collectively referred to as computer vision syndrome. This article describes both the characteristics and treatment modalities that are available at this time. Computer vision syndrome symptoms may be the cause of ocular (ocular-surface abnormalities or accommodative spasms) and/or extraocular (ergonomic) etiologies. However, the major contributor to computer vision syndrome symptoms by far appears to be dry eye. The visual effects of various display characteristics such as lighting, glare, display quality, refresh rates, and radiation are also discussed. Treatment requires a multidirectional approach combining ocular therapy with adjustment of the workstation. Proper lighting, anti-glare filters, ergonomic positioning of computer monitor and regular work breaks may help improve visual comfort. Lubricating eye drops and special computer glasses help relieve ocular surface-related symptoms. More work needs to be done to specifically define the processes that cause computer vision syndrome and to develop and improve effective treatments that successfully address these causes.

  14. Future Computing Technology (1/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. Lecturer's short bio: Andrzej Nowak has 10 years of experience in computing technologies, primarily from CERN openlab and Intel. At CERN, he managed a research lab collaborating with Intel and was part of the openlab Chief Technology Office. Andrzej also worked closely and initiated projects with the private sector (e.g. HP and Go...

  15. Science & Technology Review June 2012

    Energy Technology Data Exchange (ETDEWEB)

    Poyneer, L A

    2012-04-20

    This month's issue has the following articles: (1) A New Era in Climate System Analysis - Commentary by William H. Goldstein; (2) Seeking Clues to Climate Change - By comparing past climate records with results from computer simulations, Livermore scientists can better understand why Earth's climate has changed and how it might change in the future; (3) Finding and Fixing a Supercomputer's Faults - Livermore experts have developed innovative methods to detect hardware faults in supercomputers and help applications recover from errors that do occur; (4) Targeting Ignition - Enhancements to the cryogenic targets for National Ignition Facility experiments are furthering work to achieve fusion ignition with energy gain; (5) Neural Implants Come of Age - A new generation of fully implantable, biocompatible neural prosthetics offers hope to patients with neurological impairment; and (6) Incubator Busy Growing Energy Technologies - Six collaborations with industrial partners are using the Laboratory's high-performance computing resources to find solutions to urgent energy-related problems.

  16. Evidence review of technology and dietary assessment.

    Science.gov (United States)

    Long, JoAnn D; Littlefield, Laurel A; Estep, Gary; Martin, Hope; Rogers, Toby J; Boswell, Carol; Shriver, Brent J; Roman-Shriver, Carmen R

    2010-12-01

    Diets high in fruit and vegetable consumption are associated with a decrease in chronic diseases. Dietary factors are linked to 4 of the 10 leading noncommunicable causes of death: cardiovascular disease, some cancers, stroke, and type 2 diabetes. Accurately measuring dietary patterns has many challenges. Dietary intake measurement has traditionally relied on self-report instruments such as 24-hour recall, food record, and food frequency questionnaires to record consumption history. These methods have inherent limitations in detecting small but important changes in fruit and vegetable consumption patterns. Promising advances in technology have made more sophisticated techniques for recording dietary intake possible. Computers and Web-based programs, handheld personal digital assistants with cameras and telephone cards, smart phones, cameras, and video recorders options may reduce the burden of recording what has been consumed. Furthermore, technology-based methods of dietary assessment may provide a higher degree of reliability and validity in visually determining fruit and vegetable consumption, and additional study is warranted. The purpose of this article is to present a review of the evidence on the effectiveness of technology-based methods for dietary assessment, which included fruit and vegetable consumption. One hundred and eighty-seven articles published between 1998 and 2008 were initially identified. Fifteen met the study inclusion criteria and were evaluated by an interdisciplinary team using the Stetler Strength of Evidence Scale. Six technology-based methods for dietary assessment were identified. Findings from validity and reliability testing of technology-based methods are encouraging and need replication. Clinically important features offered through technology may reduce reporting burden and offer behavioral feedback to users. Methodologically sound, empirical research into using technology-based application for dietary assessment in a variety of

  17. Advanced computer modeling techniques expand belt conveyor technology

    Energy Technology Data Exchange (ETDEWEB)

    Alspaugh, M.

    1998-07-01

    Increased mining production is continuing to challenge engineers and manufacturers to keep up. The pressure to produce larger and more versatile equipment is increasing. This paper will show some recent major projects in the belt conveyor industry that have pushed the limits of design and engineering technology. Also, it will discuss the systems engineering discipline and advanced computer modeling tools that have helped make these achievements possible. Several examples of technologically advanced designs will be reviewed. However, new technology can sometimes produce increased problems with equipment availability and reliability if not carefully developed. Computer modeling techniques that help one design larger equipment can also compound operational headaches if engineering processes and algorithms are not carefully analyzed every step of the way.

  18. Wearable computer technology for dismounted applications

    Science.gov (United States)

    Daniels, Reginald

    2010-04-01

    Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.

  19. Science & Technology Review November 2002

    Energy Technology Data Exchange (ETDEWEB)

    Budil, K

    2002-09-25

    This months issue of Science and Technology Review has the following articles: (1) High-Tech Help for Fighting Wildfires--Commentary by Leland W. Younker; (2) This Model Can Take the Heat--A physics-based simulation program to combat wildfires combines the capabilities and resources of Lawrence Livermore and Los Alamos national laboratories. (3) The Best and the Brightest Come to Livermore--The Lawrence Fellowship Program attracts the most sought-after postdoctoral researchers to the Laboratory. (4) A view to Kill--Livermore sensors are aimed at the ''kill'' vehicle when it intercepts an incoming ballistic missile. (5) 50th Anniversary Highlight--Biological Research Evolves at Livermore--Livermore's biological research program keeps pace with emerging national issues, from studying the effects of ionizing radiation to detecting agents of biological warfare.

  20. Science& Technology Review May 2003

    Energy Technology Data Exchange (ETDEWEB)

    McMahon, D H

    2003-05-01

    This May 2003 issue of ''Science and Technology Review'' covers the following articles: (1) ''Another Weapon in the Battle against Proliferation''; (2) ''Chemical Weapons Can't Evade This Lab'', Livermore's Forensic Science Center is certified to analyze samples collected during inspections conducted to monitor the Chemical Weapons Convention. (3) ''Bird's-Eye View Clarifies Research on the Ground'' Geobotanical remote sensing has applications in homeland security and energy resource development and provides new insights into complex ecologic systems. (4) ''Age Does Make a Difference'' Age-dating techniques and ultrasensitive technologies provide a comprehensive map of California's groundwater and indicate where it is most vulnerable to contaminants. (5) ''Reducing Aerodynamic Drag'' Simulations and experiments reveal ways to make heavy trucks more aerodynamic and fuel efficient.

  1. 12th International Conference on Computing and Information Technology

    CERN Document Server

    Boonkrong, Sirapat; Unger, Herwig

    2016-01-01

    This proceedings book presents recent research work and results in the area of communication and information technologies. The chapters of this book contain the main, well-selected and reviewed contributions of scientists who met at the 12th International Conference on Computing and Information Technology (IC2IT) held during 7th - 8th July 2016 in Khon Kaen, Thailand The book is divided into three parts: “User Centric Data Mining and Text Processing”, “Data Mining Algoritms and their Applications” and “Optimization of Complex Networks”.

  2. Foundations of software technology and theoretical computer science

    Energy Technology Data Exchange (ETDEWEB)

    Madhavan, C.E.V. (Indian Inst. of Science, Bangalore (IN))

    1990-01-01

    The papers in this book report on foundations of software technology and theoretical computer science project research results. The authors report on algorithmics: design and analysis of graph, geometric, algebraic and VLSI algorithms; data structures; average analysis; complexity theory; parallel parsing; concurrency; algebraic semantics, event structures; logic programming; algebraic properties, semantics; and software technology: program transformations, algebraic methods. These results together with the formal techniques employed to present them reflect current trends pursued by research groups around the world. The papers treat their topics by reviewing existing results, developing and demonstrating new techniques and suggesting further directions for research.

  3. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  4. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  5. Microturbine Power Conversion Technology Review

    Energy Technology Data Exchange (ETDEWEB)

    Staunton, R.H.

    2003-07-21

    In this study, the Oak Ridge National Laboratory (ORNL) is performing a technology review to assess the market for commercially available power electronic converters that can be used to connect microturbines to either the electric grid or local loads. The intent of the review is to facilitate an assessment of the present status of marketed power conversion technology to determine how versatile the designs are for potentially providing different services to the grid based on changes in market direction, new industry standards, and the critical needs of the local service provider. The project includes data gathering efforts and documentation of the state-of-the-art design approaches that are being used by microturbine manufacturers in their power conversion electronics development and refinement. This project task entails a review of power converters used in microturbines sized between 20 kW and 1 MW. The power converters permit microturbine generators, with their non-synchronous, high frequency output, to interface with the grid or local loads. The power converters produce 50- to 60-Hz power that can be used for local loads or, using interface electronics, synchronized for connection to the local feeder and/or microgrid. The power electronics enable operation in a stand-alone mode as a voltage source or in grid-connect mode as a current source. Some microturbines are designed to automatically switch between the two modes. The information obtained in this data gathering effort will provide a basis for determining how close the microturbine industry is to providing services such as voltage regulation, combined control of both voltage and current, fast/seamless mode transfers, enhanced reliability, reduced cost converters, reactive power supply, power quality, and other ancillary services. Some power quality improvements will require the addition of storage devices; therefore, the task should also determine what must be done to enable the power conversion circuits to

  6. Compiler Technology for Parallel Scientific Computation

    Directory of Open Access Journals (Sweden)

    Can Özturan

    1994-01-01

    Full Text Available There is a need for compiler technology that, given the source program, will generate efficient parallel codes for different architectures with minimal user involvement. Parallel computation is becoming indispensable in solving large-scale problems in science and engineering. Yet, the use of parallel computation is limited by the high costs of developing the needed software. To overcome this difficulty we advocate a comprehensive approach to the development of scalable architecture-independent software for scientific computation based on our experience with equational programming language (EPL. Our approach is based on a program decomposition, parallel code synthesis, and run-time support for parallel scientific computation. The program decomposition is guided by the source program annotations provided by the user. The synthesis of parallel code is based on configurations that describe the overall computation as a set of interacting components. Run-time support is provided by the compiler-generated code that redistributes computation and data during object program execution. The generated parallel code is optimized using techniques of data alignment, operator placement, wavefront determination, and memory optimization. In this article we discuss annotations, configurations, parallel code generation, and run-time support suitable for parallel programs written in the functional parallel programming language EPL and in Fortran.

  7. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  8. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  9. Terascale Computing in Accelerator Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Kwok

    2002-08-21

    We have entered the age of ''terascale'' scientific computing. Processors and system architecture both continue to evolve; hundred-teraFLOP computers are expected in the next few years, and petaFLOP computers toward the end of this decade are conceivable. This ever-increasing power to solve previously intractable numerical problems benefits almost every field of science and engineering and is revolutionizing some of them, notably including accelerator physics and technology. At existing accelerators, it will help us optimize performance, expand operational parameter envelopes, and increase reliability. Design decisions for next-generation machines will be informed by unprecedented comprehensive and accurate modeling, as well as computer-aided engineering; all this will increase the likelihood that even their most advanced subsystems can be commissioned on time, within budget, and up to specifications. Advanced computing is also vital to developing new means of acceleration and exploring the behavior of beams under extreme conditions. With continued progress it will someday become reasonable to speak of a complete numerical model of all phenomena important to a particular accelerator.

  10. An International Literature Review of 1:1 Computing in Schools

    Science.gov (United States)

    Islam, M. Sirajul; Grönlund, Åke

    2016-01-01

    This paper is based on a systematic literature review relevant to classroom integration of computer technologies in schools. The purpose of this review is to gain an accumulated view of uses, impacts and implementations of 1:1 computing initiatives for school children. Unlike previous reviews this study is not limited to certain countries or…

  11. Science& Technology Review September 2003

    Energy Technology Data Exchange (ETDEWEB)

    McMahon, D

    2003-09-01

    This September 2003 issue of ''Science and Technology Review'' covers the following articles: (1) ''The National Ignition Facility Is Born''; (2) ''The National Ignition Facility Comes to Life'' Over the last 15 years, thousands of Livermore engineers, scientists, and technicians as well as hundreds of industrial partners have worked to bring the National Ignition Facility into being. (3) ''Tracking the Activity of Bacteria Underground'' Using real-time polymerase chain reaction and liquid chromatography/tandem mass spectrometry, researchers at Livermore are gaining knowledge on how bacteria work underground to break down compounds of environmental concern. (4) ''When Every Second Counts--Pathogen Identification in Less Than a Minute'' Livermore has developed a system that can quickly identify airborne pathogens such as anthrax. (5) ''Portable Radiation Detector Provides Laboratory-Scale Precision in the Field'' A team of Livermore physicists and engineers has developed a handheld, mechanically cooled germanium detector designed to identify radioisotopes.

  12. When cloud computing meets bioinformatics: a review.

    Science.gov (United States)

    Zhou, Shuigeng; Liao, Ruiqi; Guan, Jihong

    2013-10-01

    In the past decades, with the rapid development of high-throughput technologies, biology research has generated an unprecedented amount of data. In order to store and process such a great amount of data, cloud computing and MapReduce were applied to many fields of bioinformatics. In this paper, we first introduce the basic concepts of cloud computing and MapReduce, and their applications in bioinformatics. We then highlight some problems challenging the applications of cloud computing and MapReduce to bioinformatics. Finally, we give a brief guideline for using cloud computing in biology research.

  13. Applications of computational intelligence in biomedical technology

    CERN Document Server

    Majernik, Jaroslav; Pancerz, Krzysztof; Zaitseva, Elena

    2016-01-01

    This book presents latest results and selected applications of Computational Intelligence in Biomedical Technologies. Most of contributions deal with problems of Biomedical and Medical Informatics, ranging from theoretical considerations to practical applications. Various aspects of development methods and algorithms in Biomedical and Medical Informatics as well as Algorithms for medical image processing, modeling methods are discussed. Individual contributions also cover medical decision making support, estimation of risks of treatments, reliability of medical systems, problems of practical clinical applications and many other topics  This book is intended for scientists interested in problems of Biomedical Technologies, for researchers and academic staff, for all dealing with Biomedical and Medical Informatics, as well as PhD students. Useful information is offered also to IT companies, developers of equipment and/or software for medicine and medical professionals.  .

  14. Improving student retention in computer engineering technology

    Science.gov (United States)

    Pierozinski, Russell Ivan

    The purpose of this research project was to improve student retention in the Computer Engineering Technology program at the Northern Alberta Institute of Technology by reducing the number of dropouts and increasing the graduation rate. This action research project utilized a mixed methods approach of a survey and face-to-face interviews. The participants were male and female, with a large majority ranging from 18 to 21 years of age. The research found that participants recognized their skills and capability, but their capacity to remain in the program was dependent on understanding and meeting the demanding pace and rigour of the program. The participants recognized that curriculum delivery along with instructor-student interaction had an impact on student retention. To be successful in the program, students required support in four domains: academic, learning management, career, and social.

  15. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    OpenAIRE

    T. RAGHUNADHA REDDY

    2012-01-01

    With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  16. K-16 Computationally Rich Science Education: A Ten-Year Review of the "Journal of Science Education and Technology" (1998-2008)

    Science.gov (United States)

    Wofford, Jennifer

    2009-01-01

    Computing is anticipated to have an increasingly expansive impact on the sciences overall, becoming the third, crucial component of a "golden triangle" that includes mathematics and experimental and theoretical science. However, even more true with computing than with math and science, we are not preparing our students for this new reality. It is…

  17. Computer vision technology in log volume inspection

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Log volume inspection is very important in forestry research and paper making engineering. This paper proposed a novel approach based on computer vision technology to cope with log volume inspection. The needed hardware system was analyzed and the details of the inspection algorithms were given. A fuzzy entropy based on image enhancement algorithm was presented for enhancing the image of the cross-section of log. In many practical applications the cross-section is often partially invisible, and this is the major obstacle for correct inspection. To solve this problem, a robust Hausdorff distance method was proposed to recover the whole cross-section. Experiment results showed that this method was efficient.

  18. Computer Education and Instructional Technology Prospective Teachers’ Perceptions of Technology

    Directory of Open Access Journals (Sweden)

    Ümmü Gülsüm DURUKAN

    2016-04-01

    Full Text Available The purpose of this study is to determine the “technology” perception of prospective computer and instructional technologies (CEIT teachers by metaphors. For this purpose the study was carried out with 53 first-year prospective teachers studying in the Department of CEIT in a public university in the fall term of 2014-2015 academic year. The forms consisting of the statement “Technology is like ……………because ………” written few times were used as a data collection tool. Phenomenography design was used in the study and the data were analyzed by content analysis. According to the study's findings, it was found that out of 118 valid metaphors developed by the prospective teachers, 103 of them were included in positive category, 7 were in negative category and 8 were in the neutral category.

  19. Evaluating Computer Technology Integration in a Centralized School System

    Science.gov (United States)

    Eteokleous, N.

    2008-01-01

    The study evaluated the current situation in Cyprus elementary classrooms regarding computer technology integration in an attempt to identify ways of expanding teachers' and students' experiences with computer technology. It examined how Cypriot elementary teachers use computers, and the factors that influence computer integration in their…

  20. International Conference on Computers and Advanced Technology in Education

    CERN Document Server

    Advanced Information Technology in Education

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computers and Advanced Technology in Education. With the development of computers and advanced technology, the human social activities are changing basically. Education, especially the education reforms in different countries, has been experiencing the great help from the computers and advanced technology. Generally speaking, education is a field which needs more information, while the computers, advanced technology and internet are a good information provider. Also, with the aid of the computer and advanced technology, persons can make the education an effective combination. Therefore, computers and advanced technology should be regarded as an important media in the modern education. Volume Advanced Information Technology in Education is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of computers and advanced technology in education to d...

  1. Computer-Based Technologies in Dentistry: Types and Applications

    Directory of Open Access Journals (Sweden)

    Rajaa Mahdi Musawi

    2016-10-01

    Full Text Available During dental education, dental students learn how to examine patients, make diagnosis, plan treatment and perform dental procedures perfectly and efficiently. However, progresses in computer-based technologies including virtual reality (VR simulators, augmented reality (AR and computer aided design/computer aided manufacturing (CAD/CAM systems have resulted in new modalities for instruction and practice of dentistry. Virtual reality dental simulators enable repeated, objective and assessable practice in various controlled situations. Superimposition of three-dimensional (3D virtual images on actual images in AR allows surgeons to simultaneously visualize the surgical site and superimpose informative 3D images of invisible regions on the surgical site to serve as a guide. The use of CAD/CAM systems for designing and manufacturing of dental appliances and prostheses has been well established.This article reviews computer-based technologies, their application in dentistry and their potentials and limitations in promoting dental education, training and practice. Practitioners will be able to choose from a broader spectrum of options in their field of practice by becoming familiar with new modalities of training and practice.Keywords: Virtual Reality Exposure Therapy; Immersion; Computer-Aided Design; Dentistry; Education

  2. Computer Access in Higher Education for Students with Disabilities: A Practical Guide to the Selection and Use of Adapted Computer Technology. Second Edition.

    Science.gov (United States)

    Brown, Carl; And Others

    The manual provides a review of trends in adapted computer technology as well as guidelines to the selection and use of computer technology in college programs serving disabled students. Changes in the second edition include a new section dealing with the computer access needs of the severely disabled, an enlarged product guide, a curriculum guide…

  3. International Conference on Emerging Research in Electronics, Computer Science and Technology

    CERN Document Server

    Sheshadri, Holalu; Padma, M

    2014-01-01

    PES College of Engineering is organizing an International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institute. The Proceedings of the Conference presents high quality, peer reviewed articles from the field of Electronics, Computer Science and Technology. The book is a compilation of research papers from the cutting-edge technologies and it is targeted towards the scientific community actively involved in research activities.

  4. CLOUD COMPUTING WITH BIG DATA: A REVIEW

    OpenAIRE

    Anjali; Er. Amandeep Kaur; Mrs. Shakshi

    2016-01-01

    Big data is a collection of huge quantities of data. Big data is the process of examining large amounts of data. Big data and Cloud computing are the hot issues in Information Technology. Big data is the one of the main problem now a day’s. Researchers focusing how to handle huge amount of data with cloud computing and how to gain a perfect security for big data in cloud computing. To handle the Big Data problem Hadoop framework is used in which data is fragmented and executed parallel....

  5. A review of High Performance Computing foundations for scientists

    CERN Document Server

    Ibáñez, Pablo García-Risueño Pablo E

    2012-01-01

    The increase of existing computational capabilities has made simulation emerge as a third discipline of Science, lying midway between experimental and purely theoretical branches [1, 2]. Simulation enables the evaluation of quantities which otherwise would not be accessible, helps to improve experiments and provides new insights on systems which are analysed [3-6]. Knowing the fundamentals of computation can be very useful for scientists, for it can help them to improve the performance of their theoretical models and simulations. This review includes some technical essentials that can be useful to this end, and it is devised as a complement for researchers whose education is focused on scientific issues and not on technological respects. In this document we attempt to discuss the fundamentals of High Performance Computing (HPC) [7] in a way which is easy to understand without much previous background. We sketch the way standard computers and supercomputers work, as well as discuss distributed computing and di...

  6. Review of brain-computer interface technology based on virtual reality environment%基于虚拟现实环境的脑机接口技术研究进展

    Institute of Scientific and Technical Information of China (English)

    孔丽文; 薛召军; 陈龙; 何峰; 綦宏志; 万柏坤; 明东

    2015-01-01

    Virtual reality based brain-computer interface ( BCI-VR ) , which combines brain-computer interface ( BCI) and virtual reality ( VR) technology, is a new BCI application that appears in the field of multimedia and entertainment.The advantages of both BCI and VR are embodied and promoted in BCI-VR, which provides wide prospect for the BCI-VR application.This paper reviews BCI-VR researches in recently years from many aspects, such as the basic system structure, the influence between BCI and VR and so on.It also summarizes the current difficulty and future trend of BCI-VR study, hoping to exchange ideas with readers to promote the fast development of BCI-VR technology.%将脑-机接口(brain-computer interface,BCI)技术与虚拟现实(virtual reality,VR)相结合构成基于虚拟现实的脑-机接口( BCI-VR)新技术是最近在多媒体和娱乐领域出现的一种BCI应用新模式。 BCI-VR兼取两者优势互补,同时又相互促进创新,显示出广阔应用前景。本文从BCI-VR系统基本构成、BCI对VR控制和VR对BCI影响等方面,较详细介绍了近年来BCI-VR的主要研究方法、研究进展和成就,并根据作者体会小结了目前存在的难点与未来的可能发展动向,以与读者交流、共同促进BCI-VR新技术的快速发展。

  7. On the development trend of computer application technology

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    The development of computer application technology for people living and working has a very important significance. Dependent on computers are increasingly high. It put forward the development of computer application technology higher requirements. Only constant reform and renewal can meet the needs of social development. It is the only way to meet the development of the concept of sustainable development, and provide ongoing tech driving force for China's development. Based on this, the development trend of computer technology is discused.

  8. Nuclear computational science a century in review

    CERN Document Server

    Azmy, Yousry

    2010-01-01

    Nuclear engineering has undergone extensive progress over the years. In the past century, colossal developments have been made and with specific reference to the mathematical theory and computational science underlying this discipline, advances in areas such as high-order discretization methods, Krylov Methods and Iteration Acceleration have steadily grown. Nuclear Computational Science: A Century in Review addresses these topics and many more; topics which hold special ties to the first half of the century, and topics focused around the unique combination of nuclear engineering, computational

  9. Advances in Computing and Information Technology : Proceedings of the Second International

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2012-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  10. Computer vision research with new imaging technology

    Science.gov (United States)

    Hou, Guangqi; Liu, Fei; Sun, Zhenan

    2015-12-01

    Light field imaging is capable of capturing dense multi-view 2D images in one snapshot, which record both intensity values and directions of rays simultaneously. As an emerging 3D device, the light field camera has been widely used in digital refocusing, depth estimation, stereoscopic display, etc. Traditional multi-view stereo (MVS) methods only perform well on strongly texture surfaces, but the depth map contains numerous holes and large ambiguities on textureless or low-textured regions. In this paper, we exploit the light field imaging technology on 3D face modeling in computer vision. Based on a 3D morphable model, we estimate the pose parameters from facial feature points. Then the depth map is estimated through the epipolar plane images (EPIs) method. At last, the high quality 3D face model is exactly recovered via the fusing strategy. We evaluate the effectiveness and robustness on face images captured by a light field camera with different poses.

  11. Computer-aided design and computer science technology

    Science.gov (United States)

    Fulton, R. E.; Voigt, S. J.

    1976-01-01

    A description is presented of computer-aided design requirements and the resulting computer science advances needed to support aerospace design. The aerospace design environment is examined, taking into account problems of data handling and aspects of computer hardware and software. The interactive terminal is normally the primary interface between the computer system and the engineering designer. Attention is given to user aids, interactive design, interactive computations, the characteristics of design information, data management requirements, hardware advancements, and computer science developments.

  12. 2013 Bioenergy Technologies Office Peer Review Report

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2014-02-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the 2013 U.S. Department of Energy Bioenergy Technologies Office's Peer Review meeting.

  13. Geothermal Technologies Program Overview - Peer Review Program

    Energy Technology Data Exchange (ETDEWEB)

    Milliken, JoAnn [Office of Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States)

    2011-06-06

    This Geothermal Technologies Program presentation was delivered on June 6, 2011 at a Program Peer Review meeting. It contains annual budget, Recovery Act, funding opportunities, upcoming program activities, and more.

  14. Beam damage detection using computer vision technology

    Science.gov (United States)

    Shi, Jing; Xu, Xiangjun; Wang, Jialai; Li, Gong

    2010-09-01

    In this paper, a new approach for efficient damage detection in engineering structures is introduced. The key concept is to use the mature computer vision technology to capture the static deformation profile of a structure, and then employ profile analysis methods to detect the locations of the damages. By combining with wireless communication techniques, the proposed approach can provide an effective and economical solution for remote monitoring of structure health. Moreover, a preliminary experiment is conducted to verify the proposed concept. A commercial computer vision camera is used to capture the static deformation profiles of cracked cantilever beams under loading. The profiles are then processed to reveal the existence and location of the irregularities on the deformation profiles by applying fractal dimension, wavelet transform and roughness methods, respectively. The proposed concept is validated on both one-crack and two-crack cantilever beam-type specimens. It is also shown that all three methods can produce satisfactory results based on the profiles provided by the vision camera. In addition, the profile quality is the determining factor for the noise level in resultant detection signal.

  15. The Invisible Barrier to Integrating Computer Technology in Education

    Science.gov (United States)

    Aflalo, Ester

    2014-01-01

    The article explores contradictions in teachers' perceptions regarding the place of computer technologies in education. The research population included 47 teachers who have incorporated computers in the classroom for several years. The teachers expressed positive attitudes regarding the decisive importance of computer technologies in furthering…

  16. Computer Science and Technology Publications. NBS Publications List 84.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.

    This bibliography lists publications of the Institute for Computer Sciences and Technology of the National Bureau of Standards. Publications are listed by subject in the areas of computer security, computer networking, and automation technology. Sections list publications of: (1) current Federal Information Processing Standards; (2) computer…

  17. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  18. [Diesel emission control technologies: a review].

    Science.gov (United States)

    He, Hong; Weng, Duan; Zi, Xin-Yun

    2007-06-01

    The authors reviewed the researches on diesel emission control for both new engine technologies and aftertreatment technologies. Emphases were focused on the recent advancements of the diesel particulate filter (DPF) and the selective catalytic reduction (SCR) of NO(x). In addition, it was explored for the future development in this field.

  19. Technologies for Large Data Management in Scientific Computing

    CERN Document Server

    Pace, A

    2014-01-01

    In recent years, intense usage of computing has been the main strategy of investigations in several scientific research projects. The progress in computing technology has opened unprecedented opportunities for systematic collection of experimental data and the associated analysis that were considered impossible only few years ago. This paper focusses on the strategies in use: it reviews the various components that are necessary for an effective solution that ensures the storage, the long term preservation, and the worldwide distribution of large quantities of data that are necessary in a large scientific research project. The paper also mentions several examples of data management solutions used in High Energy Physics for the CERN Large Hadron Collider (LHC) experiments in Geneva, Switzerland which generate more than 30,000 terabytes of data every year that need to be preserved, analyzed, and made available to a community of several tenth of thousands scientists worldwide.

  20. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  1. Neural computation and particle accelerators research, technology and applications

    CERN Document Server

    D'Arras, Horace

    2010-01-01

    This book discusses neural computation, a network or circuit of biological neurons and relatedly, particle accelerators, a scientific instrument which accelerates charged particles such as protons, electrons and deuterons. Accelerators have a very broad range of applications in many industrial fields, from high energy physics to medical isotope production. Nuclear technology is one of the fields discussed in this book. The development that has been reached by particle accelerators in energy and particle intensity has opened the possibility to a wide number of new applications in nuclear technology. This book reviews the applications in the nuclear energy field and the design features of high power neutron sources are explained. Surface treatments of niobium flat samples and superconducting radio frequency cavities by a new technique called gas cluster ion beam are also studied in detail, as well as the process of electropolishing. Furthermore, magnetic devises such as solenoids, dipoles and undulators, which ...

  2. Emerging Computation and Information teChnologies for Education : Proceeding of 2012 International Conference on Emerging Computation and Information teChnologies for Education

    CERN Document Server

    Xu, Linli; Tian, Wenya

    2012-01-01

    The 2012 International Conference on Emerging Computation and Information teChnologies for Education (ECICE 2012) was  held on Jan. 15-16, 2012, Hangzhou, China.  The main results of the conference are presented in this proceedings book of carefully reviewed and accepted paper addressing the hottest issues in emerging computation and information technologies used for education. The volume covers a wide series of topics in the area, including Computer-Assisted Education, Educational Information Systems, Web-based Learning, etc.

  3. CT技术在安检领域应用综述%Review of the Application of Computed Tomography Technology in Safety Inspection Domain

    Institute of Scientific and Technical Information of China (English)

    郑金州; 鲁绍栋

    2012-01-01

    Among the various technologies of safety inspection,CT technique has become one of effective technologies.The first generation X-ray CT has high radio of wrong alarm and missing alarm.The new development has solved this problem.Comparing with X-ray security inspector,CT's security inspector have many advantages,because it is fundamental improvement.The fundamental improvement is three-dimensional imaging and determining density and the atomic number,overcoming the problem-double image of the X-ray security inspector.This techology can accomplish comparing physical characteristics with dangerous materials automaticly,reducing influence from human beings.The result is to lighten labor intensity of secruity staffs,also to guarantee the effect of security check.With the terrorism creeping all round the world,there is a large market for CT's security inspector.%在现有的安检技术中,X光CT技术是比较成熟、有效的手段之一。第一代X光CT安检机存在着较高的误报及漏报,CT技术的发展可以有效地解决这一问题。X光CT安检机与普通X射线安检机相比,有很多优点,技术有了本质上的提高,尤其是实现了三维成像和能够测定物体密度及原子序数,有效解决了普通X射线安检机成像的重影问题,能够自动与危险品的物理特征进行比对,减少人为因素的影响,既减轻安检人员的劳动强度,又能保证安检效果。

  4. Relationships between Computer Self-Efficacy, Technology, Attitudes and Anxiety: Development of the Computer Technology Use Scale (CTUS)

    Science.gov (United States)

    Conrad, Agatha M.; Munro, Don

    2008-01-01

    Two studies are reported which describe the development and evaluation of a new instrument, the Computer Technology Use Scale (CTUS), comprising three domains: computer self-efficacy, attitudes to technology, and technology related anxiety. Study 1 describes the development of the instrument and explores its factor structure. Study 2 used…

  5. Science & Technology Review November 2005

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide, M B

    2005-09-19

    This month's issue has the following articles: (1) A Major Advance in Understanding Metals--Commentary by Tomas Diaz de la Rubia; (2) Materials Scientists Discover the Power of ParaDiS--A new supercomputer code is revealing how metals become stronger through the formation of dislocation line junctions; (3) A Wide New Window on the Universe--Livermore scientists and engineers are contributing to the Large Synoptic Survey Telescope, which will provide unprecedented digital maps of the changing night sky; (4) Built for Speed: Graphics Processors for General-Purpose Computing--Commercial graphics processors used in the computer gaming industry are providing low-cost solutions for high-performance data processing; and (5) Negative Plasma Densities Raise Questions--Livermore physicists shed light on anomalous results in x-ray interferometry of plasmas.

  6. Science & Technology Review December 2005

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide III, M B

    2005-10-31

    This month's issue has the following articles: (1) Helping NNSA Managers Chart the Future Stockpile--Commentary by Bruce T. Goodwin; (2) Modeling the Future--Livermore researchers have developed a computational tool that simulates the effects of changing demands on the nuclear weapons complex; (3) A Peculiar Burst of Stars--By combining computer simulations with optical and radio astronomical techniques, astrophysicists can better understand how stars form; (4) Exploring the Link between Diet and Cancer--Scientists combine experiments and simulations to demonstrate how food mutagens could promote hormone-sensitive cancers; and (5) When Lightning Strikes at Site 300--Electrical engineers are certifying that Livermore's Site 300 provides a safe work environment, even during a lightning storm.

  7. Computational Fluid Dynamics (CFD) Technology Programme 1995- 1999

    Energy Technology Data Exchange (ETDEWEB)

    Haekkinen, R.J.; Hirsch, C.; Krause, E.; Kytoemaa, H.K. [eds.

    1997-12-31

    The report is a mid-term evaluation of the Computational Fluid Dynamics (CFD) Technology Programme started by Technology Development Centre Finland (TEKES) in 1995 as a five-year initiative to be concluded in 1999. The main goal of the programme is to increase the know-how and application of CFD in Finnish industry, to coordinate and thus provide a better basis for co-operation between national CFD activities and encouraging research laboratories and industry to establish co-operation with the international CFD community. The projects of the programme focus on the following areas: (1) studies of modeling the physics and dynamics of the behaviour of fluid material, (2) expressing the physical models in a numerical mode and developing a computer codes, (3) evaluating and testing current physical models and developing new ones, (4) developing new numerical algorithms, solvers, and pre- and post-processing software, and (5) applying the new computational tools to problems relevant to their ultimate industrial use. The report consists of two sections. The first considers issues concerning the whole programme and the second reviews each project

  8. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    Directory of Open Access Journals (Sweden)

    T. RAGHUNADHA REDDY

    2012-09-01

    Full Text Available With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  9. MIRAGE emitter improvements & technology review

    Science.gov (United States)

    Solomon, Steven L.; Irwin, Alan; Oleson, Jim; Sparkman, Kevin; Gallagher, Anthony M.; Lin, William; Pan, Jianmei

    2001-08-01

    With the increased demand for IR sensor and surveillance systems, there is a growing need for technologies to support their operational readiness. Measurement of sensor characteristics such as sensitivity, MRTD, and dynamic range should be standard in all mission critical systems. The Real-Time Infrared Test Set (RTIR) is a portable system designed to provide in-the-field calibration and testing of IR imaging systems and seekers. RTIR uses the high volume manufacturing processes of the Very Large Scale Integration (VLSI) and the Micro Electromechanical Systems (MEMS) technology to produce a Thermal Pixel Array (TPA). State-of-the-art CMOS processes define all the necessary on-chip digital and analog electronics. When properly driven, this array generates variable temperature,synthetic IR scenes. A nonuniformity measurement of several TPAs is presented.

  10. Review of nonconventional bioreactor technology

    Energy Technology Data Exchange (ETDEWEB)

    Turick, C.E.; Mcllwain, M.E.

    1993-09-01

    Biotechnology will significantly affect many industrial sectors in the future. Industrial sectors that will be affected include pharmaceutical, chemical, fuel, agricultural, and environmental remediation. Future research is needed to improve bioprocessing efficiency and cost-effectiveness in order to compete with traditional technologies. This report describes recent advances in bioprocess technologies and bioreactor designs and relates them to problems encountered in many industrial bioprocessing operations. The primary focus is directed towards increasing gas and vapor transfer for enhanced bioprocess kinetics as well as unproved by-product separation and removal. The advantages and disadvantages of various conceptual designs such as hollow-fiber, gas-phase, hyperbaric/hypobaric, and electrochemical bioreactors are also discussed. Specific applications that are intended for improved bioprocesses include coal desulfurization, coal liquefaction, soil bioremediation, biomass conversion to marketable chemicals, biomining, and biohydrometallurgy as well as bioprocessing of gases and vapors.

  11. Science & Technology Review September 2009

    Energy Technology Data Exchange (ETDEWEB)

    Bearinger, J P

    2009-07-24

    This month's issue has the following articles: (1) Remembering the Laboratory's First Director - Commentary by Harold Brown; (2) Herbert F. York (1921-2009): A Life of Firsts, an Ambassador for Peace - The Laboratory's first director, who died on May 19, 2009, used his expertise in science and technology to advance arms control and prevent nuclear war; (3) Searching for Life in Extreme Environments - DNA will help researchers discover new marine species and prepare to search for life on other planets; (4) Energy Goes with the Flow - Lawrence Livermore is one of the few organizations that distills the big picture about energy resources and use into a concise diagram; and (5) The Radiant Side of Sound - An experimental method that converts sound waves into light may lead to new technologies for scientific and industrial applications.

  12. Science & Technology Review October 2005

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide III, M B

    2005-08-22

    This month's issue has the following articles: (1) Important Missions, Great Science, and Innovative Technology--Commentary by Cherry A. Murray; (2) NanoFoil{reg_sign} Solders with Less Heat--Soldering and brazing to join an array of materials are now Soldering and brazing to join an array of materials are now possible without furnaces, torches, or lead; (3) Detecting Radiation on the Move--An award-winning technology can detect even small amounts An award-winning technology can detect even small amounts of radioactive material in transit; (4) Identifying Airborne Pathogens in Time to Respond--A mass spectrometer identifies airborne spores in less than A mass spectrometer identifies airborne spores in less than a minute with no false positives; (5) Picture Perfect with VisIt--The Livermore-developed software tool VisIt helps scientists The Livermore-developed software tool VisIt helps scientists visualize and analyze large data sets; (6) Revealing the Mysteries of Water--Scientists are using Livermore's Thunder supercomputer and new algorithms to understand the phases of water; and (7) Lightweight Target Generates Bright, Energetic X Rays--Livermore scientists are producing aerogel targets for use in inertial Livermore scientists are producing aerogel targets for use in inertial confinement fusion experiments and radiation-effects testing.

  13. 计算机网络安全技术%Security Technologies of Computer Network

    Institute of Scientific and Technical Information of China (English)

    罗明宇; 卢锡城; 卢泽新; 韩亚欣

    2000-01-01

    With the development of computer network,requirements of computer network security have been more and more urgent. In tills paper, goals of network security are reviewed. Several network attack methods,such as interruption,interception, modification, fabrication,are studied. Network security technologies,such as security mechan!sm,encryption,security detection,firewall,were discussed.

  14. A Financial Technology Entrepreneurship Program for Computer Science Students

    Science.gov (United States)

    Lawler, James P.; Joseph, Anthony

    2011-01-01

    Education in entrepreneurship is becoming a critical area of curricula for computer science students. Few schools of computer science have a concentration in entrepreneurship in the computing curricula. The paper presents Technology Entrepreneurship in the curricula at a leading school of computer science and information systems, in which students…

  15. 3rd International Conference on Computer & Communication Technologies

    CERN Document Server

    Bhateja, Vikrant; Raju, K; Janakiramaiah, B

    2017-01-01

    The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

  16. Interconnects for nanoscale MOSFET technology: a review

    Institute of Scientific and Technical Information of China (English)

    Amit Chaudhry

    2013-01-01

    In this paper,a review of Cu/low-k,carbon nanotube (CNT),graphene nanoribbon (GNR) and optical based interconnect technologies has been done.Interconnect models,challenges and solutions have also been discussed.Of all the four technologies,CNT interconnects satisfy most of the challenges and they are most suited for nanometer scale technologies,despite some minor drawbacks.It is concluded that beyond 32 nm technology,a paradigm shift in the interconnect material is required as Cu/low-k interconnects are approaching fundamental limits.

  17. Interconnects for nanoscale MOSFET technology: a review

    Science.gov (United States)

    Chaudhry, Amit

    2013-06-01

    In this paper, a review of Cu/low-k, carbon nanotube (CNT), graphene nanoribbon (GNR) and optical based interconnect technologies has been done. Interconnect models, challenges and solutions have also been discussed. Of all the four technologies, CNT interconnects satisfy most of the challenges and they are most suited for nanometer scale technologies, despite some minor drawbacks. It is concluded that beyond 32 nm technology, a paradigm shift in the interconnect material is required as Cu/low-k interconnects are approaching fundamental limits.

  18. Cloud Computing. Technology Briefing. Number 1

    Science.gov (United States)

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  19. Fiber-optic technology review

    Energy Technology Data Exchange (ETDEWEB)

    Lyons, P.B.

    1980-01-01

    A history of fiber technology is presented. The advantages of fiber optics are discussed (bandwidth, cost, weight and size, nonmetallic construction and isolation). Some aspects of the disadvantages of fiber systems briefly discussed are fiber and cable availability, fiber components, radiation effects, receivers and transmitters, and material dispersion. Particular emphasis over the next several years will involve development of fibers and systems optimized for use at wavelengths near 1.3 ..mu..m and development of wavelengths multiplexers for simultaneous system operation at several wavelengths.

  20. Science& Technology Review March 2004

    Energy Technology Data Exchange (ETDEWEB)

    McMahon, D H

    2004-01-23

    This month's issue has the following articles: (1) ''Rethinking Atoms for Peace and the Future of Nuclear Technology'' a commentary by Ronald F. Lehman II; (2) ''Rich Legacy from Atoms for Peace'' In 1953, President Eisenhower encouraged world leaders to pursue peaceful uses of nuclear technology. Many of Livermore's contributions in the spirit of this initiative continue to benefit society today. (3) ''Tropopause Height Becomes Another Climate-Change Fingerprint'' Simulations and observational data show that human activities are largely responsible for the steady elevation of the tropopause, the boundary between the troposphere and the stratosphere. (4) ''A Better Method for Certifying the Nuclear Stockpile'' Livermore and Los Alamos are developing a common framework for evaluating the reliability and safety of nuclear weapons. (5) ''Observing How Proteins Loop the Loop'' A new experimental method developed at Livermore allows scientists to monitor the folding processes of proteins, one molecule at a time.

  1. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  2. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  3. Geothermal Technologies Program 2011 Peer Review Report

    Energy Technology Data Exchange (ETDEWEB)

    Hollett, Douglas [Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States); Stillman, Greg [Energy Efficiency and Renewable Energy (EERE), Washington, DC (United States)

    2011-06-01

    On June 6-10, 2011, the U.S. Department of Energy (DOE), Office of Energy Efficiency and Renewable Energy (EERE), Geothermal Technologies Program (GTP or the Program) conducted its annual program peer review in Bethesda, Maryland. In accordance with the EERE Peer Review Guide, the review provides an independent, expert evaluation of the strategic goals and direction of the program and is a forum for feedback and recommendations on future program planning. The purpose of the review was to evaluate DOE-funded projects for their contribution to the mission and goals of the Program and to assess progress made against stated objectives.

  4. 2013 Geothermal Technologies Office Peer Review Report

    Energy Technology Data Exchange (ETDEWEB)

    Geothermal Technologies Office

    2014-01-01

    Geothermal Technologies Office conducted its annual program peer review in April of 2013. The review provided an independent, expert evaluation of the technical progress and merit of GTO-funded projects. Further, the review was a forum for feedback and recommendations on future GTO strategic planning. During the course of the peer review, DOE-funded projects were evaluated for 1) their contribution to the mission and goals of the GTO and 2) their progress against stated project objectives. Principal Investigators (PIs) came together in sessions organized by topic “tracks” to disseminate information, progress, and results to a panel of independent experts as well as attendees.

  5. Science & Technology Review June 2009

    Energy Technology Data Exchange (ETDEWEB)

    Bearinger, J P

    2009-06-05

    This month's issue has the following articles: (1) A Safer and Even More Effective TATB - Commentary by Bruce T. Goodwin; (2) Dissolving Molecules to Improve Their Performance - Computer scientists and chemists have teamed to develop a green method for recycling a valuable high explosive that is no longer manufactured; (3) Exceptional People Producing Great Science - Postdoctoral researchers lend their expertise to projects that support the Laboratory's missions; (4) Revealing the Identities and Functions of Microbes - A new imaging technique illuminates bacterial metabolic pathways and complex relationships; and (5) A Laser Look inside Planets - Laser-driven ramp compression may one day reveal the interior structure of Earth-like planets in other solar systems.

  6. Science & Technology Review April 2005

    Energy Technology Data Exchange (ETDEWEB)

    Henson, V E

    2005-03-04

    This months issue has the following articles: (1) Addressing National Security Needs Benefits Energy and Environment--Commentary by Jane C. S. Long; (2) Monitoring Earth's Subsurface from Space--Livermore scientists are using radar images and simulations Livermore scientists are using radar images and simulations to detect subsurface changes on Earth of less than 1 centimeter; (3) Faculty on Sabbatical Find a Good Home at Livermore--Since 2000, more than 20 faculty members from around the world have come to the Laboratory as sabbatical scholars; (4) Finding Genes by Leaps and Bounds--Livermore biologists use computational analysis and laboratory frogs to identify functional elements of the human genome; and (5) Into the Wide Blue Yonder with BlueGene/L--BlueGene/L is the world's fastest supercomputer, and it embodies an entirely new class of highly scalable platform.

  7. Science & Technology Review April 2007

    Energy Technology Data Exchange (ETDEWEB)

    Radousky, H B

    2007-02-27

    This month's issue has the following articles: (1) Shaking the Foundations of Solar-System Science--Commentary by William H. Goldstein; (2) Stardust Results Challenge Astronomical Convention--The first samples retrieved from a comet are a treasure trove of surprises to Laboratory researchers; (3) Fire in the Hole--Underground coal gasification may help to meet future energy supply challenges with a production process from the past; (4) Big Physics in Small Spaces--A newly developed computer model successfully simulates particle-laden fluids flowing through complex microfluidic systems; (5) A New Block on the Periodic Table--Livermore and Russian scientists add a new block to the periodic table with the creation of element 118; and (6) A Search for Patterns and Connections--Throughout his career, Edward Teller searched for mathematical solutions to explain the physical world.

  8. Science & Technology Review May 2005

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide, M B

    2005-04-05

    Articles in this month's issue include: (1) Einstein's Legacy Alive at Livermore--Commentary by Michael R. Anastasio; (2) Applying Einstein's Theories of Relativity--In their efforts to understand the cosmos, Livermore physicists must account for the relativistic effects postulated by Albert Einstein; (3) Locked in Rock: Sequestering Carbon Dioxide Underground--Livermore scientists are examining technologies to reduce atmospheric concentrations of carbon dioxide by burying it deep underground; (4) Modeling the Subsurface Movement of Radionuclides--Using data from past underground nuclear tests, a Livermore team is modeling radionuclide migration at the Nevada Test Site; and (5) Novel Materials from Solgel Chemistry--Livermore chemists are developing a method for fabricating solgels to better control the physical properties of the new materials.

  9. Energy & Technology Review, March 1994

    Energy Technology Data Exchange (ETDEWEB)

    Quirk, W.J.; Canada, J.; de Vore, L.; Gleason, K.; Kirvel, R.D.; Kroopnick, H.; McElroy, L.; Van Dyke, P. [eds.

    1994-03-01

    This monthly report of research activities at Lawrence Livermore Laboratory highlights three different research programs. First, the Forensic Science Center supports a broad range of analytical techniques that focus on detecting and analyzing chemical, biological, and nuclear species. Analyses are useful in the areas of nonproliferation, counterterrorism, and law enforcement. Second, starting in 1977, the laboratory initiated a series of studies to understand a high incidence of melanoma among employees. Continued study shows that mortality from this disease has decreased from the levels seen in the 1980`s. Third, to help coordinate the laboratory`s diverse research projects that can provide better healthcare tools to the public, the lab is creating the new Center for Healthcare Technologies.

  10. Science & Technology Review December 2007

    Energy Technology Data Exchange (ETDEWEB)

    Chinn, D J

    2007-10-24

    This month's issue has the following articles: (1) Homeland Security Begins Abroad--Commentary by John C. Doesburg; (2) Out of Harm's Way--New physical protection and accountability systems, together with a focus on security, safeguard nuclear materials in the Russian Federation; (3) A Calculated Journey to the Center of the Earth--Determining the permeability of partially melted metals in a mineral matrix unlocks secrets about the formation of Earth's core; (4) Wireless That Works--Communication technologies using ultrawideband radar are improving national security; and (5) Power to the People--Edward Teller envisioned safe and plentiful nuclear power for peaceful applications.

  11. Science & Technology Review March 2010

    Energy Technology Data Exchange (ETDEWEB)

    Bearinger, J P

    2010-01-29

    This month's issue has the following articles: (1) Countering the Growing Chem-Bio Threat -- Commentary by Penrose (Parney) C. Albright; (2) Responding to a Terrorist Attack Involving Chemical Warfare Agents -- Livermore scientists are helping the nation strengthen plans to swiftly respond to an incident involving chemical warfare agents; (3) Revealing the Secrets of a Deadly Disease -- A Livermore-developed system helps scientists better understand how plague bacteria infect healthy host cells; (4) A New Application for a Weapons Code -- Simulations reveal for the first time how blast waves cause traumatic brain injuries; (5) Testing Valuable National Assets for X-Ray Damage -- Experiments at the National Ignition Facility are measuring the effects of radiation on critical systems; and (6) An Efficient Way to Harness the Sun's Power -- New solar thermal technology is designed to supply residential electric power at nearly half of the current retail price.

  12. Science & Technology Review May 2006

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide III, M B

    2006-04-03

    This month's issue has the following articles: (1) Science and Technology Help the Nation Counter Terrorism--Commentary by Raymond J. Juzaitis; (2) Imagers Provide Eyes to See Gamma Rays--Gamma-ray imagers provide increased radiation detection capabilities and enhance the nation's arsenal for homeland security; (3) Protecting the Nation's Livestock--Foot-and-mouth disease could devastate America's livestock; a new assay provides a rapid means to detect it; (4) Measures for Measures--Laboratory physicists combine emissivity and reflectivity to achieve highly accurate temperature measurements of metal foils; and (5) Looping through the Lamb Shift--Livermore scientists measured a small perturbation in the spectra of highly ionized uranium--the first measurement of the two-loop Lamb shift in a bound state.

  13. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITYEvaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  14. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITY Evaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  15. Science & Technology Review March 2007

    Energy Technology Data Exchange (ETDEWEB)

    Radousky, H B

    2007-02-05

    This month's issue has the following articles: (1) Partnering to Enhance Americans Health--Commentary by Tomas Diaz de la Rubia; (2) Advancing the Frontiers in Cancer Research--Researchers at the University of California Davis Cancer Center and Lawrence Livermore are teaming up to fight cancer; (3) On the Leading Edge of Atmospheric Predictions--Continual research and development at the National Atmospheric Release Advisory Center help mitigate the consequences of toxic airborne hazards; (4) Climate and Agriculture: Change Begets Change--A Livermore researcher is using computer models to explore how a warmer climate may affect crop yields in California; (5) New Routes to High Temperatures and Pressures--With functionally graded density impactors composed of thin metal and polyethylene films, researchers can explore new areas of experimental physics; and (6) From Sound Waves to Stars: Teller's Contributions to Shock Physics--Edward Teller's interest in shock physics led to significant developments in both basic and applied science.

  16. A review of computer assisted learning in medical undergraduates

    Directory of Open Access Journals (Sweden)

    Lisha J John

    2013-01-01

    Full Text Available Laboratory based practical classes, have been the corner stone of undergraduate pharmacology learning. Ethical issues with the use of animals and rapid development of information technology has led to newer trends in teaching and learning such as computer assisted learning. Computer assisted learning (CAL software includes computer based packages, focusing on interactive instruction in a specific subject area, collection of animal experiments that encourage students to understand concepts in pharmacology. CAL offers a number of advantages to both students and teachers; most important being meeting the learning objectives. Few disadvantages and pitfalls to implementation in medical schools are also associated with CAL sessions. This article reviews the trend of CAL in pharmacology, advantages, disadvantages and pitfalls to the implementation of CAL.

  17. A review of computer assisted learning in medical undergraduates.

    Science.gov (United States)

    John, Lisha J

    2013-04-01

    Laboratory based practical classes, have been the corner stone of undergraduate pharmacology learning. Ethical issues with the use of animals and rapid development of information technology has led to newer trends in teaching and learning such as computer assisted learning. Computer assisted learning (CAL) software includes computer based packages, focusing on interactive instruction in a specific subject area, collection of animal experiments that encourage students to understand concepts in pharmacology. CAL offers a number of advantages to both students and teachers; most important being meeting the learning objectives. Few disadvantages and pitfalls to implementation in medical schools are also associated with CAL sessions. This article reviews the trend of CAL in pharmacology, advantages, disadvantages and pitfalls to the implementation of CAL.

  18. Review and Discussion of Children's Conceptions of Computers

    Science.gov (United States)

    Rücker, Michael T.; Pinkwart, Niels

    2016-04-01

    Today's children grow up surrounded by computers. They observe them, interact with them and, as a consequence, start forming conceptions of how they work and what they can do. Any constructivist approach to learning requires that we gain an understanding of such preconceived ideas and beliefs in order to use computers as learning tools in an effective and informed manner. In this paper, we present five such conceptions that children reportedly form about computers, based on an interdisciplinary literature review. We then evaluate how persistent these conceptions appear to be over time and in light of new technological developments. Finally, we discuss the relevance and implications of our findings for education in the contexts of conceptual pluralism and conceptual categorisation.

  19. African Journals Online: Technology, Computer Science ...

    African Journals Online (AJOL)

    Items 1 - 29 of 29 ... The Ethiopian Journal of Science and Technology (EJST) publishes high .... Sciences is an international journal reporting significant new results in all .... general technology rocketry, space and astronomy, earth sciences, ...

  20. A Review of Optical NDT Technologies

    OpenAIRE

    Hong Zhang(Department of Physics and Center for Quantum Spacetime (CQUeST), Sogang University, 35 Baekbeom-ro, Mapo-gu, Seoul, 121-742 Korea); Rong-Sheng Lu; Gui-Yun Tian; Yong-Kai Zhu

    2011-01-01

    Optical non-destructive testing (NDT) has gained more and more attention in recent years, mainly because of its non-destructive imaging characteristics with high precision and sensitivity. This paper provides a review of the main optical NDT technologies, including fibre optics, electronic speckle, infrared thermography, endoscopic and terahertz technology. Among them, fibre optics features easy integration and embedding, electronic speckle focuses on whole-field high precision detection, inf...

  1. Technology-enhanced suicide prevention interventions: A systematic review.

    Science.gov (United States)

    Kreuze, Elizabeth; Jenkins, Carolyn; Gregoski, Mathew; York, Janet; Mueller, Martina; Lamis, Dorian A; Ruggiero, Kenneth J

    2017-07-01

    Objective Suicide prevention is a high priority. Scalable and sustainable interventions for suicide prevention are needed to set the stage for population-level impact. This systematic review explores how technology-enhanced interventions target suicide risk and protective factors, using the Centers for Disease Control and Prevention (CDC, 2015) Risk and Protective Factors Ecological Model. Methods Information databases (PsycINFO, PubMed and CINAHL) were systematically searched and records including technology-enhanced interventions for suicide prevention ( n = 3764) were reviewed. Records with varying technologies and diverse methodologies were integrated into the search. Results Review of the records resulted in the inclusion of 16 studies that utilized technology-enhanced interventions to address determinants of suicidal behaviour. This includes the use of standalone or, in most cases, adjunct technology-enhanced interventions for suicide prevention delivered by mobile phone application, text message, telephone, computer, web, CD-ROM and video. Conclusion Intervention effectiveness was variable, but several technology-enhanced interventions have demonstrated effectiveness in reducing suicidal ideation and mental health co-morbidities. Large-scale research and evaluation initiatives are needed to evaluate the costs and long-term population-level impact of these interventions.

  2. CICT Computing, Information, and Communications Technology Program

    Science.gov (United States)

    Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)

    2002-01-01

    The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.

  3. Science and Technology Review, November 1998

    Energy Technology Data Exchange (ETDEWEB)

    Eimerl, D.

    1998-11-01

    Lawrence Livermore National Laboratory is operated by the University of California for the Department of Energy. At Livermore, we focus science and technology on assuring our nationÕs security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published 10 times a year to communicate, to a broad audience, the LaboratoryÕs scientific and technological accomplishments in fulfilling its primary missions. The publicationÕs goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  4. Science & Technology Review October/November 2015

    Energy Technology Data Exchange (ETDEWEB)

    Orme, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meissner, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kotta, P. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-11-05

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  5. Science & Technology Review January/February 2017

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, R. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meissner, C. N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-01-12

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  6. Science & Technology Review January/February 2016

    Energy Technology Data Exchange (ETDEWEB)

    Orme, C. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meissner, C. N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-01-18

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  7. Science and Technology Review, December 1998

    Energy Technology Data Exchange (ETDEWEB)

    Eimerl, D.

    1998-12-01

    Lawrence Livermore National Laboratory is operated by the University of California for the Department of Energy. At Livermore, we focus science and technology on assuring our nationÕs security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published 10 times a year to communicate, to a broad audience, the LaboratoryÕs scientific and technological accomplishments in fulfilling its primary missions. The publicationÕs goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  8. A Review of Optical NDT Technologies

    Directory of Open Access Journals (Sweden)

    Hong Zhang

    2011-08-01

    Full Text Available Optical non-destructive testing (NDT has gained more and more attention in recent years, mainly because of its non-destructive imaging characteristics with high precision and sensitivity. This paper provides a review of the main optical NDT technologies, including fibre optics, electronic speckle, infrared thermography, endoscopic and terahertz technology. Among them, fibre optics features easy integration and embedding, electronic speckle focuses on whole-field high precision detection, infrared thermography has unique advantages for tests of combined materials, endoscopic technology provides images of the internal surface of the object directly, and terahertz technology opens a new direction of internal NDT because of its excellent penetration capability to most of non-metallic materials. Typical engineering applications of these technologies are illustrated, with a brief introduction of the history and discussion of recent progress.

  9. Identification of risk factors of computer information technologies in education.

    OpenAIRE

    Hrebniak M.P.; Shchudro S.A.; Yakimova K.O.

    2014-01-01

    The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and c...

  10. Computational thermodynamics and informational technologies in the field of computer design of materials

    Directory of Open Access Journals (Sweden)

    Udovsky A.L.

    2002-01-01

    Full Text Available Computational thermodynamics and informational technologies in the field of computer desing of materials as well as appliance of CALPHAD method on resolution of thermodynamic problems are presented in this paper.

  11. A Review on Modern Distributed Computing Paradigms: Cloud Computing, Jungle Computing and Fog Computing

    OpenAIRE

    Hajibaba, Majid; Gorgin, Saeid

    2014-01-01

    The distributed computing attempts to improve performance in large-scale computing problems by resource sharing. Moreover, rising low-cost computing power coupled with advances in communications/networking and the advent of big data, now enables new distributed computing paradigms such as Cloud, Jungle and Fog computing.Cloud computing brings a number of advantages to consumers in terms of accessibility and elasticity. It is based on centralization of resources that possess huge processing po...

  12. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    AVTOMATIZATSIYA PROIZVODSTVA, No 1, Jan 87) 69 EDUCATION The Computer Has Come to School (RUSSKIY YAZYK I LITERATURA V KAZAKHSKOY SHKOLE, No 7, Jul 86) 76...avtomatizatsiya proizvodstva", 1987 12770 CSO: 1Ö63/209 75 EDUCATION THE COMPUTER HAS COME TO SCHOOL Alma-Ata RUSSKIY YAZYK I LITERATURA V...and wins over minds and inspires upperclassmen—the avant-garde of computer education. COPYRIGHT: "Russkiy yazyk i literatura v Kazakhskoy shkole

  13. Consumer Sleep Technologies: A Review of the Landscape.

    Science.gov (United States)

    Ko, Ping-Ru T; Kientz, Julie A; Choe, Eun Kyoung; Kay, Matthew; Landis, Carol A; Watson, Nathaniel F

    2015-12-15

    To review sleep related consumer technologies, including mobile electronic device "apps," wearable devices, and other technologies. Validation and methodological transparency, the effect on clinical sleep medicine, and various social, legal, and ethical issues are discussed. We reviewed publications from the digital libraries of the Association for Computing Machinery, Institute of Electrical and Electronics Engineers, and PubMed; publications from consumer technology websites; and mobile device app marketplaces. Search terms included "sleep technology," "sleep app," and "sleep monitoring." Consumer sleep technologies are categorized by delivery platform including mobile device apps (integrated with a mobile operating system and utilizing mobile device functions such as the camera or microphone), wearable devices (on the body or attached to clothing), embedded devices (integrated into furniture or other fixtures in the native sleep environment), accessory appliances, and conventional desktop/website resources. Their primary goals include facilitation of sleep induction or wakening, self-guided sleep assessment, entertainment, social connection, information sharing, and sleep education. Consumer sleep technologies are changing the landscape of sleep health and clinical sleep medicine. These technologies have the potential to both improve and impair collective and individual sleep health depending on method of implementation. © 2015 American Academy of Sleep Medicine.

  14. Science and Technology Review, April 1999

    Energy Technology Data Exchange (ETDEWEB)

    Eimerl, D

    1999-04-01

    The following two abstracts are for the 2 feature stories in this issue of ''Science and Technology Review''. (1) ''Structural Biology Looks at the Ties That Bind''--Over the last five years, Lawrence Livermore has established a program in structural biology to further its work on DNA damage and repair processes. This new program supports a number of other newer projects as well, including the development of antidotes, detection systems, and countermeasures for minimizing the threat of exposure to biological warfare agents. Laboratories have been established for x-ray crystallography and nuclear magnetic resonance spectroscopy, the only methods for obtaining high-resolution, three-dimensional data about individual molecules. This experimental structural biology work is supplemented by computational efforts in molecular modeling and protein prediction. (2) ''Duplicating the Plasmas of Distant Stars''--Livermore researchers are creating in the laboratory the same kinds of extremely hot plasmas found in distant stars. The experimental program, conducted at Sandia National Laboratories' pulsed-power facilities, focuses on cepheids (big pulsating stars), supernovae (the brightest objects in the universe), and stars that generate x rays through a process called accretion. A key aspect of the experiments is testing advanced Livermore atomic models--OPAL for the cepheid and supernova experiments and LXSS for the x-ray tests. The data from these experiments will help scientists better understand the birth and evolution of stars, galaxies, and the universe itself. The new experimental techniques, strengthened codes, and diagnostics developed for the tests are also helping the Department of Energy's Stockpile Stewardship Program keep the nation's aging nuclear weapons safe, secure, and reliable in the absence of nuclear testing.

  15. Computer-Assisted Technology for the Twice Exceptional

    Science.gov (United States)

    Rizza, Mary

    2006-01-01

    Technology helps students develop coping strategies to deal with various learning differences. Assistive technology is a common intervention provided to students with disabilities and generally varies depending on student need. Within gifted education, the use of computers and technology is concentrated on curricular applications and activities…

  16. Impact of Computer Technology on Design and Craft Education

    Science.gov (United States)

    Thorsteinsson, Gisli

    2014-01-01

    This research aims to answer the question, "How has the use of computer technology benefited the compulsory education system, focusing on Design and Technology?" In order to reply this question, it was necessary to focus on interactive whiteboards, e-portfolios and digital projectors as the main technology formats. An initial literature…

  17. Technology Foundations for Computational Evaluation of Software Security Attributes

    Science.gov (United States)

    2006-12-01

    Technology Foundations for Computational Evaluation of Software Security Attributes Gwendolyn H. Walton Thomas A. Longstaff Richard C...security attributes to the functional behavior of the software . The emergence of CERT’s new function extraction (FX) technology , unavailable to previous... software meets security requirements if they have been specified in behavioral terms. FX technology prescribes effective means to create and record

  18. On Integrating Computer Technology into Our Curriculum

    Institute of Scientific and Technical Information of China (English)

    Jianhua Bai

    2000-01-01

    @@ 1. Introduction When something new and exciting occurs in technology, some of us foreign language teachers tend to become too excited to notice the limitations of the new technology. It is no exception with the current use of multimedia and intemet technology in our curriculum. It is my belief that,without an adequate understanding of its limitations as well as its advantages, we may find ourselves disappointed as we move ahead in integrating the multimedia technology into our instruction in a meaningful way. Therefore, in this paper, I would like to start with the discussion of the limitation of multimedia technology and then discuss how we can make use of this new technology to improve our teaching and learning of Chinese as a foreign language.

  19. A Literature Review of Spreadsheet Technology

    DEFF Research Database (Denmark)

    Bock, Alexander

    2016-01-01

    number of people from different backgrounds. This literature review presents an overview of research on spreadsheet technology, its challenges and its solutions. We also attempt to identify why software developers generally frown upon spreadsheets and how spreadsheet research can help alter this view....

  20. SOFTWARE AGENT AND CLOUD COMPUTING: A BRIEF REVIEW

    Directory of Open Access Journals (Sweden)

    Firas D. Ahmed

    2016-02-01

    Full Text Available The merging of interests between Cloud applications which necessary require an intelligent software agent with elastic, dynamic, with independent behavior ability and multi-agent systems that need consistent distributed infrastructures can be resulted with new effective applications and systems. Cloud computing services offered by using large-scale infrastructures with elastic services and high-performance capability since these resources could be adjusted to end user and application needs. Cloud systems and infrastructures are offered by a service-oriented interface that provides computing resources using X-as-a-service model to introduce cloud services on the pay-per-use model. Agent-based system is significant for the improving the use of software agents for boosting cloud service composition, service discovery, negotiation mechanism and several domains. Integrating these two computing paradigms enables cloud-computing systems to become more elastic, autonomic, and intelligent service's capability. Meanwhile, scalable systems with high-performance on the cloud are capable of providing MASs with a consistent and large-scale computing infrastructure on which to execute large-scale systems with flexibility. The significant of this paper is introducing and discussing potential benefits of integration multi-agent technology with Cloud computing systems. This reviewing will lead having in attention the aim of developing high-performance and sophisticated applications with intelligent using software agents and Cloud paradigm.

  1. Geothermal Technologies Office 2012 Peer Review Report

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-01

    On May 7-10, 2012, the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, Geothermal Technologies Office conducted its annual program peer review in Westminster, CO. In accordance with the EERE Peer Review Guide, the review provides an independent, expert evaluation of the strategic goals and direction of the office and is a forum for feedback and recommendations on future office planning. The purpose of the review was to evaluate DOE-funded projects for their contribution to the mission and goals of the office and to assess progress made against stated objectives. Project scoring results, expert reviewer comments, and key findings and recommendations are included in this report.

  2. On the use of computation optimization opportunities in computer technologies for applied and computational mathematics problems with prescribed quality characteristics

    Science.gov (United States)

    Babich, M. D.; Zadiraka, V. K.; Lyudvichenko, V. A.; Sergienko, I. V.

    2010-12-01

    The use of various opportunities for computation optimization in computer technologies for applied and computational mathematics problems with prescribed quality characteristics is investigated. More precisely, the choice and determination of computational resources and methods of their efficient use for finding an approximate solution of problems up to prescribed accuracy in a limited amount of processor time are investigated.

  3. Cutting Technology Costs with Refurbished Computers

    Science.gov (United States)

    Dessoff, Alan

    2010-01-01

    Many district administrators are finding that they can save money on computers by buying preowned ones instead of new ones. The practice has other benefits as well: It allows districts to give more computers to more students who need them, and it also promotes good environmental practices by keeping the machines out of landfills, where they…

  4. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    3 hours; the Leninabad Silk Combine of the Ministry of Light Industry, 2 hours; the Tadkhik Scientific Research Institute of Scientific and...established sectorial oblast computer centers in Leninabad , Kulyab, and Kurgan-Tyube. Was there a need for this if computer centers of statistical

  5. Mistaking Computers for Technology: Technology Literacy and the Digital Divide

    Science.gov (United States)

    Amiel, Tel

    2006-01-01

    No other information and communication technology has swept the globe with greater speed than the Internet, having the potential to promote vast social, economic, and political transformations. As new technologies become available the pattern of adoption and diffusion creates disparities in access and ownership. At the most basic this gap is…

  6. First International Symposium on Applied Computing and Information Technology (ACIT 2013)

    CERN Document Server

    Applied Computing and Information Technology

    2014-01-01

    This book presents the selected results of the 1st International Symposium on Applied Computers and Information Technology (ACIT 2013) held on August 31 – September 4, 2013 in Matsue City, Japan, which brought together researchers, scientists, engineers, industry practitioners, and students to discuss all aspects of  Applied Computers & Information Technology, and its practical challenges. This book includes the best 12 papers presented at the conference, which were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review.  

  7. Evolving technologies for Space Station Freedom computer-based workstations

    Science.gov (United States)

    Jensen, Dean G.; Rudisill, Marianne

    1990-01-01

    Viewgraphs on evolving technologies for Space Station Freedom computer-based workstations are presented. The human-computer computer software environment modules are described. The following topics are addressed: command and control workstation concept; cupola workstation concept; Japanese experiment module RMS workstation concept; remote devices controlled from workstations; orbital maneuvering vehicle free flyer; remote manipulator system; Japanese experiment module exposed facility; Japanese experiment module small fine arm; flight telerobotic servicer; human-computer interaction; and workstation/robotics related activities.

  8. Energy and Technology Review, August--September

    Energy Technology Data Exchange (ETDEWEB)

    Sefcik, J A [ed.

    1992-01-01

    This issue of Energy and Technology Review focuses on cooperative research and development agreements (CRADAs)-one of the Laboratory's most effective means of technology transfer. The first article chronicles the legislative evolution of these agreements. The second article examines the potential beneficial effects of CRADAs on the national economy and discusses their role in the development and marketing of Laboratory technologies. The third article provides information on how to initiate and develop CRADAs at LLNL, and the fourth and fifth articles describe the Laboratory's two most prominent technology transfer projects. One is a 30-month CRADA with General Motors to develop advanced lasers for cutting, welding, and heat-treating operations. The cover photograph shows this laser cutting through a piece of steel 1/16 of an inch thick. The other project is a three-year CRADA with Amoco, Chevron-Conoco, and Unocal to refine our oil shale retorting process.

  9. Valve Technology Arrangement of Cryopump: A Review

    Directory of Open Access Journals (Sweden)

    Sanjiv Y. Rajput

    2014-05-01

    Full Text Available A cryopump or a "cryogenic pump" is a vacuum pump that pumps the trap gases and vapours by condensing them on a cold surface. Helium gas which is very light can only be pumped by Cryopump. Cryopump cannot be used when working for continuous operation as it pumps the effluent till the saturation state is achieved. Then the absorbed gases are to be collected through other mechanical pump through regeneration process. Hence, valve technology arrangement is incorporated with the cryopump in order to achieve the continuous pumping when two cryopump are used in alternate processes (i.e. absorption and regeneration. Various design of Valve technology arrangement is proposed by different researcher all over the world. This review paper focuses on the different proposed valve technology arrangement and elaborately explains the various components of valve technology and concludes the best possible arrangement that can be used in Cryopump.

  10. Science & Technology Review July/August 2016

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, Ramona L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meissner, Caryn N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Chinn, Ken B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-07-18

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world. In this issue for the months of July and August 2016, there are two features: one on Science and Technology in Support of Nuclear Nonproliferation, and another on Seeking Out Hidden Radioactive Materials. Then there are highlights are three research projects--on optics, plasma science, and the nature of neutrinos--along with a news section and patents and awards.

  11. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  12. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  13. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  14. Computer technology: Silicon chips lighten up

    Science.gov (United States)

    Vivien, Laurent

    2015-12-01

    Microprocessor communications have received a boost from the integration of electronics and photonics in silicon -- a first step towards low power consumption and efficient computing systems. See Letter p.534

  15. Review of Current Nuclear Vacuum System Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, M.; McCracken, J.; Shope, T.

    2003-02-25

    Nearly all industrial operations generate unwanted dust, particulate matter, and/or liquid wastes. Waste dust and particulates can be readily tracked to other work locations, and airborne particulates can be spread through ventilation systems to all locations within a building, and even vented outside the building - a serious concern for processes involving hazardous, radioactive, or nuclear materials. Several varieties of vacuum systems have been proposed and/or are commercially available for clean up of both solid and liquid hazardous and nuclear materials. A review of current technologies highlights both the advantages and disadvantages of the various systems, and demonstrates the need for a system designed to address issues specific to hazardous and nuclear material cleanup. A review of previous and current hazardous/nuclear material cleanup technologies is presented. From simple conventional vacuums modified for use in industrial operations, to systems specifically engineered for such purposes, the advantages and disadvantages are examined in light of the following criteria: minimal worker exposure; minimal secondary waste generation;reduced equipment maintenance and consumable parts; simplicity of design, yet fully compatible with all waste types; and ease of use. The work effort reviews past, existing and proposed technologies in light of such considerations. Accomplishments of selected systems are presented, including identified areas where technological improvements could be suggested.

  16. Computational methods in molecular imaging technologies

    CERN Document Server

    Gunjan, Vinit Kumar; Venkatesh, C; Amarnath, M

    2017-01-01

    This book highlights the experimental investigations that have been carried out on magnetic resonance imaging and computed tomography (MRI & CT) images using state-of-the-art Computational Image processing techniques, and tabulates the statistical values wherever necessary. In a very simple and straightforward way, it explains how image processing methods are used to improve the quality of medical images and facilitate analysis. It offers a valuable resource for researchers, engineers, medical doctors and bioinformatics experts alike.

  17. Cloud computing technology framework and reducing risks

    OpenAIRE

    Akrir, Khaled Ali Ahmed

    2015-01-01

    The thesis investigates, in a qualitative way, the vectors that contribute to cloud computing risks in the areas of security, business, and compliance. The focus of this research is on the identification of risk vectors that affect cloud computing and the creation of a framework that can help IT managers in their cloud adoption process. Economic pressures on businesses are creating a demand for an alternative delivery of the model that can provide flexible payments, dramatic cuts in capital i...

  18. Science and technology review, October 1998 issue

    Energy Technology Data Exchange (ETDEWEB)

    Smart, J

    1998-10-01

    A mobile radar system for inspecting bridges. Laser pulses to strengthen metal. A new kind of key that uses lasers. An imaging system that reveals the insides of teeth. A novel method to measure temperature. Computer software that boosts semiconductor production. And a detector to aid optics manufacturing efficiency. These inventions by Lawrence Livermore National Laboratory researchers and their industrial partners were recently honored by R&D Magazine as seven of the top 100 technological achievements of the past year.

  19. Computational intelligence for technology enhanced learning

    Energy Technology Data Exchange (ETDEWEB)

    Xhafa, Fatos [Polytechnic Univ. of Catalonia, Barcelona (Spain). Dept. of Languages and Informatics Systems; Caballe, Santi; Daradoumis, Thanasis [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Computer Sciences Multimedia and Telecommunications; Abraham, Ajith [Machine Intelligence Research Labs (MIR Labs), Auburn, WA (United States). Scientific Network for Innovation and Research Excellence; Juan Perez, Angel Alejandro (eds.) [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Information Sciences

    2010-07-01

    E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments. The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others. Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity. (orig.)

  20. Health effects of synfuels technology: a review

    Energy Technology Data Exchange (ETDEWEB)

    Sanathanan, L.P.; Reilly, C.A.; Marshall, S.A.; Wilzbach, K.E.

    1981-04-01

    This document contains annotated synopses of available information pertinent to health impacts of synthetic fuel technologies under development, and identifies needs for further information. The report focuses on carcinogenesis, which appears to be a special problem with coal conversion technologies. This review is intended to serve as a reference for the NEPA Affairs Division of DOE in its evaluation of the overall synthetic fuel program and specific projects in the program. Updated versions of this document are expected to be prepared annually or semiannually as new information becomes available.

  1. Science and Technology Review December 2011

    Energy Technology Data Exchange (ETDEWEB)

    Nikolic, R J

    2011-11-01

    This month's issue has the following articles: (1) High-Performance Computing for Energy Innovation - Commentary by Tomas Diaz de la Rubia; (2) Simulating the Next Generation of Energy Technologies - Projects using high-performance computing demonstrate Livermore's computational horsepower and improve the quality of energy solutions and the speed of deployment; (3) ARC Comes into Focus - The Advanced Radiographic Capability, a petawatt-class laser, can penetrate dense objects to reveal material dynamics during National Ignition Facility experiments; (4) A New Method to Track Viral Evolution - A sensitive technique developed at the Laboratory can identify virus mutations that may jump from host to host; and (5) Data for Defense: New Software Finds It Fast - Department of Defense warfighters and planners are using Livermore software systems to extract pertinent information from massive amounts of data.

  2. Science and Technology Review May 1999

    Energy Technology Data Exchange (ETDEWEB)

    Eimerl, D

    1999-05-01

    The following two abstracts are for the 2 feature stories in this issue of ''Science and Technology Review''. (1) ''Leveraging Science and Technology in the National Interest''--A sampling of current projects at Lawrence Livermore demonstrates the many ways in which the Laboratory's science and technology support Department of Defense missions. These projects range from engineering and fabricating munitions and explosives to developing the advanced computer codes that optimize warhead design or assess their hazards. The Penetration Augmented Munition is a portable, multistage weapon that not only provides offensive capability for diminishing adversaries' mobility and capability but also gives US soldiers an additional margin of security in a hostile encounter. Livermore's fiber-composite sabot makes weapons more lethal and is particularly effective in tank warfare. The GLO (global local optimizer) code optimizes the design of shaped-charge warheads, while the CHEETAH thermochemical code improves explosives formulation. CALE, a multiuse mechanical code, is used to help the Air Force assess missile launch site safety and in particular to predict hazards from propellant that falls to the ground when rockets misfire. ALE3D, now being upgraded, will increase the capability of codes to assess safety hazards. (2) ''Extracting Valuable Information from Acoustic Waves''--Lawrence Livermore researchers are developing advanced techniques for interpreting acoustic signals, focusing on complex algorithms that at times mimic the reasoning processes of the human brain. Three current acoustic signal-processing projects, involving heart valve classification, oil exploration, and large-structure analysis, demonstrate the wide range of acoustic signal usefulness. To determine whether an artificial heart valve is intact or needs replacing, a suite of Livermore algorithms sift through heart and body sounds to

  3. Enabling Computational Technologies for Terascale Scientific Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Ashby, S.F.

    2000-08-24

    We develop scalable algorithms and object-oriented code frameworks for terascale scientific simulations on massively parallel processors (MPPs). Our research in multigrid-based linear solvers and adaptive mesh refinement enables Laboratory programs to use MPPs to explore important physical phenomena. For example, our research aids stockpile stewardship by making practical detailed 3D simulations of radiation transport. The need to solve large linear systems arises in many applications, including radiation transport, structural dynamics, combustion, and flow in porous media. These systems result from discretizations of partial differential equations on computational meshes. Our first research objective is to develop multigrid preconditioned iterative methods for such problems and to demonstrate their scalability on MPPs. Scalability describes how total computational work grows with problem size; it measures how effectively additional resources can help solve increasingly larger problems. Many factors contribute to scalability: computer architecture, parallel implementation, and choice of algorithm. Scalable algorithms have been shown to decrease simulation times by several orders of magnitude.

  4. Cloud manufacturing distributed computing technologies for global and sustainable manufacturing

    CERN Document Server

    Mehnen, Jörn

    2013-01-01

    Global networks, which are the primary pillars of the modern manufacturing industry and supply chains, can only cope with the new challenges, requirements and demands when supported by new computing and Internet-based technologies. Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing introduces a new paradigm for scalable service-oriented sustainable and globally distributed manufacturing systems.   The eleven chapters in this book provide an updated overview of the latest technological development and applications in relevant research areas.  Following an introduction to the essential features of Cloud Computing, chapters cover a range of methods and applications such as the factors that actually affect adoption of the Cloud Computing technology in manufacturing companies and new geometrical simplification method to stream 3-Dimensional design and manufacturing data via the Internet. This is further supported case studies and real life data for Waste Electrical ...

  5. The Application of Computer Technology in Art Design

    Directory of Open Access Journals (Sweden)

    Tao Xin

    2016-01-01

    Full Text Available After entering the twenty-first Century, computer technology has been greatly developed, applied in various fields gradually, and gained remarkable achievement. Computer technology not only is a project of great importance in China, but also cannot be ignored in the world. It has already attracted attention of numerous people, gradually integrated in daily life and closely related with it. Now how to apply it into more fields has been the main focus of our nation and also the topic we care about all the time. It is also an important project in our country to apply computer technology in art design in order to higher the art design quality. The purpose of this paper is to introduce people problems of the application of computer technology in art design, and find ways to promote cooperation and common development of them.

  6. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  7. Leveraging mobile computing and communication technologies in education

    DEFF Research Database (Denmark)

    Annan, Nana Kofi

    The emergence of mobile computing and communication technologies has come with it, an unprecedented transformation in digitalising every aspect of human activities. This transformation has brought about a high degree of mobility in the way knowledge is constructed, processed, stored...... and disseminated through the use of portable information and communication technologies (ICTs) such as smart phones, tablets, personal computers and laptop computers. These mobile devices use mobile communication infrastructure to promote the mobility affordances for human activities anywhere and anytime. Although...... education and technology have evolved in tandem over the past years, this dissertation recognises the lapse that there is, in not being able to effectively leverage technology to improve education delivery by most educators. The study appreciates the enormousness of mobile computing and communication...

  8. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  9. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  10. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  11. 2012 DOE Vehicle Technologies Program Annual Merit Review

    Energy Technology Data Exchange (ETDEWEB)

    None

    2012-10-26

    The 2012 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting was held May 14-18, 2012 in Crystal City, Virginia. The review encompassed all of the work done by the Hydrogen Program and the Vehicle Technologies Program: a total of 309 individual activities were reviewed for Vehicle Technologies, by a total of 189 reviewers. A total of 1,473 individual review responses were received for the technical reviews.

  12. Computer technology -- 1996: Applications and methodology. PVP-Volume 326

    Energy Technology Data Exchange (ETDEWEB)

    Hulbert, G.M. [ed.] [Univ. of Michigan, Ann Arbor, MI (United States); Hsu, K.H. [ed.] [Babcock and Wilcox, Barberton, OH (United States); Lee, T.W. [ed.] [FMC Corp., Santa Clara, CA (United States); Nicholas, T. [ed.] [USAF Wright Laboratory, Wright-Patterson AFB, OH (United States)

    1996-12-01

    The primary objective of the Computer Technology Committee of the ASME Pressure Vessels and Piping Division is to promote interest and technical exchange in the field of computer technology, related to the design and analysis of pressure vessels and piping. The topics included in this volume are: analysis of bolted joints; nonlinear analysis, applications and methodology; finite element analysis and applications; and behavior of materials. Separate abstracts were prepared for 23 of the papers in this volume.

  13. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  14. Science and Technology Review, August 1996

    Energy Technology Data Exchange (ETDEWEB)

    Failor, B.; Stull, S.; Wheatcraft, D. [eds.

    1996-08-01

    This review is published ten times a year to communicate, to a broad audience, Lawrence Livermore National Laboratory`s scientific and technological accomplishments, particularly in the Laboratory`s core mission areas - global security, energy and the environment, and bioscience and biotechnology. Topics discussed in this August 1996 issue are: Keeping the nuclear stockpile safe, secure, and reliable; Molten salt takes the bang out of high explosives; Security clearances meet the electronic age; and Exploring oil fields with crosshole electromagnetic induction.

  15. MHD Technology Transfer, Integration and Review Committee

    Energy Technology Data Exchange (ETDEWEB)

    1992-01-01

    This fifth semi-annual status report of the MHD Technology Transfer, Integration, and Review Committee (TTIRC) summarizes activities of the TTIRC during the period April 1990 through September 1990. It includes summaries and minutes of committee meetings, progress summaries of ongoing Proof-of-Concept (POC) contracts, discussions pertaining to technical integration issues in the POC program, and planned activities for the next six months.

  16. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  17. Computational Intelligence in Highway Management: A Review

    Directory of Open Access Journals (Sweden)

    Ondrej Pribyl

    2015-10-01

    Full Text Available Highway management systems are used to improve safety and driving comfort on highways by using control strategies and providing information and warnings to drivers. They use several strategies starting from speed and lane management, through incident detection and warning systems, ramp metering, weather information up to, for example, informing drivers about alternative roads. This paper provides a review of the existing approaches to highway management systems, particularly speed harmonization and ramp metering. It is focused only on modern and advanced approaches, such as soft computing, multi-agent methods and their interconnection. Its objective is to provide guidance in the wide field of highway management and to point out the most relevant recent activities which demonstrate that development in the field of highway management is still important and that the existing research exhibits potential for further enhancement.

  18. Technological Imperatives: Using Computers in Academic Debate.

    Science.gov (United States)

    Ticku, Ravinder; Phelps, Greg

    Intended for forensic educators and debate teams, this document details how one university debate team, at the University of Iowa, makes use of computer resources on campus to facilitate storage and retrieval of information useful to debaters. The introduction notes the problem of storing and retrieving the amount of information required by debate…

  19. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    2007-11-02

    27 Automating Data Processing on the Rayon and Oblast Levels (A.P. Kolesnik, K.V. Golovin , et al.; FINANSY SSSR, No 5, May 86) 29 Development of...RSFSR Ministry of Finance, K. V. Golovin , division chief, main computer center, USSR Ministry of Finance, and V. Z. Usov, division chief, main

  20. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    algorithm consists in moving along RD to a particular finite node proceeding from successive analysis of characteris- tics (indexes) of the sampling...requirements on devices control system hardware complex. Characteristics of transducers. Characteristics of the computer, USO [entity connection...characteristics of these classes of tasks; these characteris- tics were used as the raw data for calculating the particular effectiveness criteria

  1. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  2. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  3. CACTUS: Calculator and Computer Technology User Service.

    Science.gov (United States)

    Hyde, Hartley

    1998-01-01

    Presents an activity in which students use computer-based spreadsheets to find out how much grain should be added to a chess board when a grain of rice is put on the first square, the amount is doubled for the next square, and the chess board is covered. (ASK)

  4. Cloud Computing Technologies Facilitate Earth Research

    Science.gov (United States)

    2015-01-01

    Under a Space Act Agreement, NASA partnered with Seattle-based Amazon Web Services to make the agency's climate and Earth science satellite data publicly available on the company's servers. Users can access the data for free, but they can also pay to use Amazon's computing services to analyze and visualize information using the same software available to NASA researchers.

  5. USSR Report: Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    Georgian SSR Academy of Sciences: "Ready for Dialogue"] [Text] Computers in schools, auditoria , and educational laboratories are an phenomenon to which we...professional-technical academies and VUZ auditoria . Obviously, the color of the screens and the characters on them is of major importance for people

  6. Computer technology: its potential for industrial energy conservation. A technology applications manual

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    Today, computer technology is within the reach of practically any industrial corporation regardless of product size. This manual highlights a few of the many applications of computers in the process industry and provides the technical reader with a basic understanding of computer technology, terminology, and the interactions among the various elements of a process computer system. The manual has been organized to separate process applications and economics from computer technology. Chapter 1 introduces the present status of process computer technology and describes the four major applications - monitoring, analysis, control, and optimization. The basic components of a process computer system also are defined. Energy-saving applications in the four major categories defined in Chapter 1 are discussed in Chapter 2. The economics of process computer systems is the topic of Chapter 3, where the historical trend of process computer system costs is presented. Evaluating a process for the possible implementation of a computer system requires a basic understanding of computer technology as well as familiarity with the potential applications; Chapter 4 provides enough technical information for an evaluation. Computer and associated peripheral costs and the logical sequence of steps in the development of a microprocessor-based process control system are covered in Chapter 5.

  7. Fighting Child Pornography: A Review of Legal and Technological Developments

    Directory of Open Access Journals (Sweden)

    Jasmine Eggestein

    2014-12-01

    Full Text Available In our digitally connected world, the law is arguably behind the technological developments of the Internet age.  While this causes many issues for law enforcement, it is of particular concern in the area of child pornography in the United States.  With the wide availability of technologies such as digital cameras, peer-to-peer file sharing, strong encryption, Internet anonymizers and cloud computing, the creation and distribution of child pornography has become more widespread. Simultaneously, fighting the growth of this crime has become more difficult.  This paper explores the development of both the legal and technological environments surrounding digital child pornography.  In doing so, we cover the complications that court decisions have given law enforcement who are trying to investigate and prosecute child pornographers.  We then provide a review of the technologies used in this crime and the forensic challenges that cloud computing creates for law enforcement.  We note that both legal and technological developments since the 1990s seem to be working to the advantage of users and sellers of child pornography.  Before concluding, we provide a discussion and offer observations regarding this subject.

  8. Progress and Challenges in High Performance Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Xue-Jun Yang; Yong Dou; Qing-Feng Hu

    2006-01-01

    High performance computers provide strategic computing power in the construction of national economy and defense, and become one of symbols of the country's overall strength. Over 30 years, with the supports of governments, the technology of high performance computers is in the process of rapid development, during which the computing performance increases nearly 3 million times and the processors number expands over 10 hundred thousands times. To solve the critical issues related with parallel efficiency and scalability, scientific researchers pursued extensive theoretical studies and technical innovations. The paper briefly looks back the course of building high performance computer systems both at home and abroad,and summarizes the significant breakthroughs of international high performance computer technology. We also overview the technology progress of China in the area of parallel computer architecture, parallel operating system and resource management,parallel compiler and performance optimization, environment for parallel programming and network computing. Finally, we examine the challenging issues, "memory wall", system scalability and "power wall", and discuss the issues of high productivity computers, which is the trend in building next generation high performance computers.

  9. Audio Technology and Mobile Human Computer Interaction

    DEFF Research Database (Denmark)

    Chamberlain, Alan; Bødker, Mads; Hazzard, Adrian

    2017-01-01

    Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design...

  10. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    fast set-up change for manufacturing of new products" (GOST [State All-Union Standart ] 14.001-73 and GOST 26228- 85). A flexible automated...tekhnologicheskoy podgotovki proizvodstva" [Scientific Foundations of Integrated Standart izat ion of Technological Preparation of Production

  11. Reviewing and Critiquing Computer Learning and Usage among Older Adults

    Science.gov (United States)

    Kim, Young Sek

    2008-01-01

    By searching the keywords of "older adult" and "computer" in ERIC, Academic Search Premier, and PsycINFO, this study reviewed 70 studies published after 1990 that address older adults' computer learning and usage. This study revealed 5 prominent themes among reviewed literature: (a) motivations and barriers of older adults' usage of computers, (b)…

  12. Advanced sensor-computer technology for urban runoff monitoring

    Science.gov (United States)

    Yu, Byunggu; Behera, Pradeep K.; Ramirez Rochac, Juan F.

    2011-04-01

    The paper presents the project team's advanced sensor-computer sphere technology for real-time and continuous monitoring of wastewater runoff at the sewer discharge outfalls along the receiving water. This research significantly enhances and extends the previously proposed novel sensor-computer technology. This advanced technology offers new computation models for an innovative use of the sensor-computer sphere comprising accelerometer, programmable in-situ computer, solar power, and wireless communication for real-time and online monitoring of runoff quantity. This innovation can enable more effective planning and decision-making in civil infrastructure, natural environment protection, and water pollution related emergencies. The paper presents the following: (i) the sensor-computer sphere technology; (ii) a significant enhancement to the previously proposed discrete runoff quantity model of this technology; (iii) a new continuous runoff quantity model. Our comparative study on the two distinct models is presented. Based on this study, the paper further investigates the following: (1) energy-, memory-, and communication-efficient use of the technology for runoff monitoring; (2) possible sensor extensions for runoff quality monitoring.

  13. Designing Pervasive Computing Technology - In a Nomadic Work Perspective

    DEFF Research Database (Denmark)

    Kristensen, Jannie Friis

    2002-01-01

    In my thesis work I am investigating how the design of pervasive/ubiquitous computing technology, relate to the flexible and individual work practice of nomadic workers. Through empirical studies and with an experimental systems development approach, the work is focused on: a) Supporting...... interpretation and inclusion of implicit and invisible as well as explicit and visible characteristics of artifacts, users and use practices. b) Identifying breakdowns in human-computer interaction situations, with particular emphasis on the computation that happens "behind the scenes" in the pervasive computing...... environment, and how that computational process at a sufficient level is made intelligible, visible, accountable and negotiable to the human participant....

  14. Design technologies for green and sustainable computing systems

    CERN Document Server

    Ganguly, Amlan; Chakrabarty, Krishnendu

    2013-01-01

    This book provides a comprehensive guide to the design of sustainable and green computing systems (GSC). Coverage includes important breakthroughs in various aspects of GSC, including multi-core architectures, interconnection technology, data centers, high-performance computing (HPC), and sensor networks. The authors address the challenges of power efficiency and sustainability in various contexts, including system design, computer architecture, programming languages, compilers and networking. ·         Offers readers a single-source reference for addressing the challenges of power efficiency and sustainability in embedded computing systems; ·         Provides in-depth coverage of the key underlying design technologies for green and sustainable computing; ·         Covers a wide range of topics, from chip-level design to architectures, computing systems, and networks.

  15. A Discussion of Thin Client Technology for Computer Labs

    CERN Document Server

    Martínez-Mateo, Jesús; Pérez-Rey, David

    2010-01-01

    Computer literacy is not negotiable for any professional in an increasingly computerised environment. Educational institutions should be equipped to provide this new basic training for modern life. Accordingly, computer labs are an essential medium for education in almost any field. Computer labs are one of the most popular IT infrastructures for technical training in primary and secondary schools, universities and other educational institutions all over the world. Unfortunately, a computer lab is expensive, in terms of both initial purchase and annual maintenance costs, and especially when we want to run the latest software. Hence, research efforts addressing computer lab efficiency, performance or cost reduction would have a worldwide repercussion. In response to this concern, this paper presents a survey on thin client technology for computer labs in educational environments. Besides setting out the advantages and drawbacks of this technology, we aim to refute false prejudices against thin clients, identif...

  16. A Technology Assessment of Personal Computers. Vol. I: Summary.

    Science.gov (United States)

    Nilles, Jack M.

    This volume summarizes the results of a 2-year technology assessment of personal computers. The purpose of this study was to explore possible future modes of growth of the personal computer and related industries, to assess the impacts and consequences of that growth, and to present some of the policy issues and options which may arise as a…

  17. Course Syllabus: The Social Impact of Computer Information Technology.

    Science.gov (United States)

    Behar, Joseph

    1988-01-01

    This syllabus describes the course background, central themes and issues, texts, resources, and recommended readings. Main topics are the sociology of information technology, computers and social change, telecommunications, computers and human interactions, applications in working, and social issues and political implications. (YP)

  18. Using Computer and Video Technologies to Develop Interpersonal Skills.

    Science.gov (United States)

    Campbell, J. Olin; And Others

    1995-01-01

    Two studies investigated ways in which computer and video technology can support expert human coaches in order to reduce instructor time and increase learner-centered environments; the goal was to train undergraduate students to facilitate others' interpersonal problem solving. Results indicate that the technology-supported methods can decrease…

  19. Computed Tomography Technology: Development and Applications for Defence

    Science.gov (United States)

    Baheti, G. L.; Saxena, Nisheet; Tripathi, D. K.; Songara, K. C.; Meghwal, L. R.; Meena, V. L.

    2008-09-01

    Computed Tomography(CT) has revolutionized the field of Non-Destructive Testing and Evaluation (NDT&E). Tomography for industrial applications warrants design and development of customized solutions catering to specific visualization requirements. Present paper highlights Tomography Technology Solutions implemented at Defence Laboratory, Jodhpur (DLJ). Details on the technological developments carried out and their utilization for various Defence applications has been covered.

  20. Building Computer Technology Skills in TESOL Teacher Education

    Science.gov (United States)

    DelliCarpini, Margo

    2012-01-01

    This paper reports on an action research study that investigated factors influencing TESOL (teaching English to speakers of other languages) teacher candidates' (TCs) selection and use of technology in the English as a second language (ESL) classroom and the influence of explicit training in context in the use of computer technology for second…

  1. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  2. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  3. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  4. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  5. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  6. Promoting Technology-Assisted Active Learning in Computer Science Education

    Science.gov (United States)

    Gao, Jinzhu; Hargis, Jace

    2010-01-01

    This paper describes specific active learning strategies for teaching computer science, integrating both instructional technologies and non-technology-based strategies shown to be effective in the literature. The theoretical learning components addressed include an intentional method to help students build metacognitive abilities, as well as…

  7. A Partnership Project: Integrating Computer Technology and Orff-Schulwerk.

    Science.gov (United States)

    Woody, Robert H.; Fredrickson, Julie M.

    2000-01-01

    Describes an alternative approach for general music educators wanting to study new instructional strategies in which a classroom teacher and university educator collaborated to explore the integration of computer technology with Orff-Schulwerk in second- and third-grade music classes. Discusses the project and two of its technology-assisted…

  8. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  9. Terminology of the Newest Technologies and Computering

    Directory of Open Access Journals (Sweden)

    Angelė Kaulakienė

    2011-04-01

    Full Text Available The thirty-five-year period of computer terminology has to be considered the initial stage of its evolution where synonymy and variability are characteristic features, which are usually determined by both extra-linguistic and linguistic factors. The choice of borrowed or Lithuanian terms is often determined by the relationship between borrowed and Lithuanian terms. The first stage of the newest dictionaries of computer terms approbated by the Commission of the Lithuanian Language shows that the terminology of the mentioned field is being systematized and normalized. However, the ratio between Lithuanian and borrowed terms is not fully acceptable yet, and it is partially determined by disagreement among specialists on the status of synonymous terms and the choice of them.

  10. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    standpoint of task formulation and performance. These are the recognition of images created by man for Interaction with a computer; the recognition of...systems for visual inspection of the shape of tablets on a pharmaceutical conveyer line or research systems for analyzing the images of three...34 fuzziness " (disorderliness) of the knowledge. 11 It is well known that certain tasks related to image interpretation are accomplished in

  11. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    1987-03-02

    quality silage preservative and shampoo from waste fat from the fish-canning industry. One can also name an improved oil shale processing technology...institution section of the CC CP of Estonia , and V. Rayangu, minister of higher and secondary special education of the EsSSR participated in the work of the...name at the Tallinn Polytechnical Institute. This is the first such department in Estonia . In practice it has already become an intersectorial

  12. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    genetic engineering and laser technology. And now there is a new goal, a new highly complex task: elec- tronics. According to available estimates, as...by enterprises of other ministries. More than 100 cities are to be included in this system. FTD /SNAP CSO: 1863/184 11 JPRS-UCC-85-003 23 April...robotiza- tion. FTD /SNAP CSO: 1863/184 58 JPRS-UCC-85-003 23 April 1985 ENHANCED-FLEXIBILITY ROBOT HAND MODULES INVENTED Moscow

  13. A Meta-Analysis of the Effects of Computer Technology on School Students' Mathematics Learning

    Science.gov (United States)

    Li, Qing; Ma, Xin

    2010-01-01

    This study examines the impact of computer technology (CT) on mathematics education in K-12 classrooms through a systematic review of existing literature. A meta-analysis of 85 independent effect sizes extracted from 46 primary studies involving a total of 36,793 learners indicated statistically significant positive effects of CT on mathematics…

  14. Selecting a Suitable Cloud Computing Technology Deployment Model for an Academic Institute : A Case Study

    Science.gov (United States)

    Ramachandran, N.; Sivaprakasam, P.; Thangamani, G.; Anand, G.

    2014-01-01

    Purpose: Cloud Computing (CC) technology is getting implemented rapidly in the educational sector to improve learning, research and other administrative process. As evident from the literature review, most of these implementations are happening in the western countries such as USA, UK, while the level of implementation of CC in developing…

  15. Global Journal of Computer Science and Technology. Volume 1.2

    Science.gov (United States)

    Dixit, R. K.

    2009-01-01

    Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…

  16. Cesium and Strontium Separation Technologies Literature Review

    Energy Technology Data Exchange (ETDEWEB)

    T. A. Todd; T. A. Todd; J. D. Law; R. S. Herbst

    2004-03-01

    Integral to the Advanced Fuel Cycle Initiative (AFCI) Program’s proposed closed nuclear fuel cycle, the fission products cesium and strontium in the dissolved spent nuclear fuel stream are to be separated and managed separately. A comprehensive literature survey is presented to identify cesium and strontium separation technologies that have the highest potential and to focus research and development efforts on these technologies. Removal of these high-heat-emitting fission products reduces the radiation fields in subsequent fuel cycle reprocessing streams and provides a significant short-term (100 yr) heat source reduction in the repository. This, along with separation of actinides, may provide a substantial future improvement in the amount of fuel that could be stored in a geologic repository. The survey and review of the candidate cesium and strontium separation technologies are presented herein. Because the AFCI program intends to manage cesium and strontium together, technologies that simultaneously separate both elements are of the greatest interest, relative to technologies that separate only one of the two elements.

  17. Preservation technologies for fresh meat - a review.

    Science.gov (United States)

    Zhou, G H; Xu, X L; Liu, Y

    2010-09-01

    Fresh meat is a highly perishable product due to its biological composition. Many interrelated factors influence the shelf life and freshness of meat such as holding temperature, atmospheric oxygen (O(2)), endogenous enzymes, moisture, light and most importantly, micro-organisms. With the increased demand for high quality, convenience, safety, fresh appearance and an extended shelf life in fresh meat products, alternative non-thermal preservation technologies such as high hydrostatic pressure, superchilling, natural biopreservatives and active packaging have been proposed and investigated. Whilst some of these technologies are efficient at inactivating the micro-organisms most commonly related to food-borne diseases, they are not effective against spores. To increase their efficacy against vegetative cells, a combination of several preservation technologies under the so-called hurdle concept has also been investigated. The objective of this review is to describe current methods and developing technologies for preserving fresh meat. The benefits of some new technologies and their industrial limitations is presented and discussed.

  18. Art and Technology of Entertainment Computing and Communication

    CERN Document Server

    Cheok, Adrian David

    2010-01-01

    "Art and Technology of Entertainment Computing and Communication" takes a blue sky research perspective on the field of interactive media for entertainment computing. Adrian David Cheok argues that entertainment as an end-product is useful for interactive play, however it is also a powerful tool for learning and communication and it is also a key driver for the development of information technology. This book explores the future of entertainment technologies used for communication and describes quantum step research. It will inform and inspire readers to create their own radical inve

  19. Identification of risk factors of computer information technologies in education

    Directory of Open Access Journals (Sweden)

    Hrebniak M.P.

    2014-03-01

    Full Text Available The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and characteristics of mental ability among schoolchildren and students during training in high school. Common risk factors, while operating CIT, are: intensification and formalization of intellectual activity, adverse ergonomic parameters, unfavorable working posture, excess of hygiene standards by chemical and physical characteristics. The priority preventive directions in applying computer information technology in education are: improvement of optimal visual parameters of activity, rationalization of ergonomic parameters, minimizing of adverse effects of chemical and physical conditions, rationalization of work and rest activity.

  20. Science and Technology Review December 2009

    Energy Technology Data Exchange (ETDEWEB)

    Bearinger, J P

    2009-11-17

    This month's issue has the following articles: (1) Advanced Materials for Our Past, Present, and Future - Commentary by Tomas Diaz de la Rubia; (2) A Defensive 'Coat' for Materials under Attack - Amorphous metal coatings provide the strength and corrosion resistance needed to protect military vessels and spent nuclear fuel containers; (3) Too Close for Comfort - Laboratory scientists are analyzing the feasibility of using nuclear explosives to disrupt or divert asteroids on a collision course with Earth; (4) Hyperion: A Titan of High-Performance Computing Systems - Livermore is collaborating with 10 computing industry leaders to create a test bed for Linux cluster hardware and software technologies; (5) Isolating Pathogens for Speedy Identification - An automated miniature device separates viruses, bacteria, genetic material, and proteins from nasal swabs and blood and urine samples for speedy identification.

  1. Science and technology review, April 1996

    Energy Technology Data Exchange (ETDEWEB)

    Failor, B.; Stull, S. [eds.

    1996-04-01

    There are two main feature articles in this publication. The first article tells of how using off-the-shelf computers, state-of-the-art CCDs, and a network of collaborators, scientist at Lawrence Livermore National Lab explore the composition of dark matter. Indications are that MACHOs (MAssive Compact Halo Objects) make up the bulk of dark matter in the universe. The second article discusses a new breed of Livermore-developed, flywheel-based energy storage systems using new materials, new technologies, and new thinking to develop a new electromechanical battery. Patents and research highlights are also listed in this publication.

  2. Near threshold computing technology, methods and applications

    CERN Document Server

    Silvano, Cristina

    2016-01-01

    This book explores near-threshold computing (NTC), a design-space using techniques to run digital chips (processors) near the lowest possible voltage.  Readers will be enabled with specific techniques to design chips that are extremely robust; tolerating variability and resilient against errors.  Variability-aware voltage and frequency allocation schemes will be presented that will provide performance guarantees, when moving toward near-threshold manycore chips.  ·         Provides an introduction to near-threshold computing, enabling reader with a variety of tools to face the challenges of the power/utilization wall; ·         Demonstrates how to design efficient voltage regulation, so that each region of the chip can operate at the most efficient voltage and frequency point; ·         Investigates how performance guarantees can be ensured when moving towards NTC manycores through variability-aware voltage and frequency allocation schemes.  .

  3. A review of computer-aided design/computer-aided manufacture techniques for removable denture fabrication.

    Science.gov (United States)

    Bilgin, Mehmet Selim; Baytaroğlu, Ebru Nur; Erdem, Ali; Dilber, Erhan

    2016-01-01

    The aim of this review was to investigate usage of computer-aided design/computer-aided manufacture (CAD/CAM) such as milling and rapid prototyping (RP) technologies for removable denture fabrication. An electronic search was conducted in the PubMed/MEDLINE, ScienceDirect, Google Scholar, and Web of Science databases. Databases were searched from 1987 to 2014. The search was performed using a variety of keywords including CAD/CAM, complete/partial dentures, RP, rapid manufacturing, digitally designed, milled, computerized, and machined. The identified developments (in chronological order), techniques, advantages, and disadvantages of CAD/CAM and RP for removable denture fabrication are summarized. Using a variety of keywords and aiming to find the topic, 78 publications were initially searched. For the main topic, the abstract of these 78 articles were scanned, and 52 publications were selected for reading in detail. Full-text of these articles was gained and searched in detail. Totally, 40 articles that discussed the techniques, advantages, and disadvantages of CAD/CAM and RP for removable denture fabrication and the articles were incorporated in this review. Totally, 16 of the papers summarized in the table. Following review of all relevant publications, it can be concluded that current innovations and technological developments of CAD/CAM and RP allow the digitally planning and manufacturing of removable dentures from start to finish. As a result according to the literature review CAD/CAM techniques and supportive maxillomandibular relationship transfer devices are growing fast. In the close future, fabricating removable dentures will become medical informatics instead of needing a technical staff and procedures. However the methods have several limitations for now.

  4. Towards Empowering Hearing Impaired Students' Skills in Computing and Technology

    Directory of Open Access Journals (Sweden)

    Nihal Esam Abuzinadah

    2017-01-01

    Full Text Available Studies have shown that deaf and hearing-impaired students have many difficulties in learning applied disciplines such as Medicine, Engineering, and Computer Programming. This study aims to investigate the readiness of deaf students to pursue higher education in applied sciences, more specifically in computer science. This involves investigating their capabilities in computer skills and applications. Computer programming is an integral component in the technological field that can facilitate the development of further scientific advances. Devising a manner of teaching the deaf and hearing-impaired population will give them an opportunity to contribute to the technology sector. This would allow these students to join the scientific world when otherwise; they are generally unable to participate because of the limitations they encounter. The study showed that deaf students in Jeddah are eager to continue their higher education and that a large percentage of these students are keen on studying computer science, particularly if they are provided with the right tools.

  5. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration; Alandes Pradillo, Maria

    2016-01-01

    AGIS is the information system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing (ADC) applications and services. In this note, we describe the evolution and the recent developments of AGIS functionalities, related to integration of new technologies recently become widely used in ATLAS Computing like flexible computing utilization of opportunistic Cloud and HPC resources, ObjectStore services integration for Distributed Data Management (Rucio) and ATLAS workload management (PanDA) systems, unified storage protocols declaration required for PandDA Pilot site movers and others.

  6. Cyclic distillation technology - A mini-review

    DEFF Research Database (Denmark)

    Bîldea, Costin Sorin; Pătruţ, Cătălin; Jørgensen, Sten Bay;

    2016-01-01

    Process intensification in distillation systems has received much attention during the past decades, with the aim of increasing both energy and separation efficiency. Various techniques, such as internal heat-integrated distillation, membrane distillation, rotating packed bed, dividing-wall columns...... and reactive distillation were studied and reported in literature. All these techniques employ the conventional continuous counter-current contact of vapor and liquid phases. Cyclic distillation technology is based on an alternative operating mode using separate phase movement which leads to key practical...... advantages in both chemical and biochemical processes. This article provides a mini-review of cyclic distillation technology. The topics covered include the working principle, design and control methods, main benefits and limitations as well as current industrial applications. Cyclic distillation can...

  7. Science and Technology Review, September 1996

    Energy Technology Data Exchange (ETDEWEB)

    Failor, B.; Upadhye, R.; Wheatcraft, D. [eds.

    1996-09-01

    This review is published ten times a year to communicate, to a broad audience, Lawrence Livermore National Laboratory`s scientific and technological accomplishments in fulfilling its primary missions. The feature articles are `Taking Lasers beyond the National Ignition Facility` and `Jumpin` Jupiter! Metallic Hydrogen`. The first article describes the ultimate goal of laser fusion as the production of electricity by inertial confinement fusion. Advances in diode-laser technology promise to take another step closer to that goal. The latter article discusses a Laboratory team`s efforts to provide evidence for the metallization of hydrogen based on the team`s expertise in shock compression. A commentary on `The Next Frontiers of Advanced Lasers Research is provided, and a research highlight is given on `Modeling Human Joints and Prosthetic Implants.

  8. 뇌-컴퓨터 쿸터페쿴스 (Brain-Computer Interfaces) 기술엿 대한 국내·외 연구개발 뿙향 조사 (Research and Development in Brain-Computer Interfacing Technology: A Comprehensive Technical Review). Final Report.

    NARCIS (Netherlands)

    Nam, Chang Soo; Kim, Sung-Phil; Krusienkki, Dean; Nijholt, Antinus

    2015-01-01

    This report commisioned by the Korean American Scientists and Engineers Association (KSEA) and written with the support of the Korea Federation of Science and Technology Societies (KOFST) surveys research and development trends in the area of brain-computer interface (Brain-Computer Interfaces, BCI)

  9. 뇌-컴퓨터 인터페이스 (Brain-Computer Interfaces) 기술에 대한 국내·외 연구개발 동향 조사 (Research and Development in Brain-Computer Interfacing Technology: A Comprehensive Technical Review). Final Report.

    NARCIS (Netherlands)

    Nam, Chang Soo; Kim, Sung-Phil; Krusienkki, Dean; Nijholt, Anton

    2015-01-01

    This report commisioned by the Korean American Scientists and Engineers Association (KSEA) and written with the support of the Korea Federation of Science and Technology Societies (KOFST) surveys research and development trends in the area of brain-computer interface (Brain-Computer Interfaces, BCI)

  10. Impacts of Online Technology Use in Second Language Writing: A Review of the Literature

    Science.gov (United States)

    Lin, Show Mei; Griffith, Priscilla

    2014-01-01

    This article reviews the literature on computer-supported collaborative learning in second language and foreign language writing. While research has been conducted on the effects of online technology in first language reading and writing, this article explores how online technology affects second and foreign language writing. The goal of this…

  11. Impacts of Online Technology Use in Second Language Writing: A Review of the Literature

    Science.gov (United States)

    Lin, Show Mei; Griffith, Priscilla

    2014-01-01

    This article reviews the literature on computer-supported collaborative learning in second language and foreign language writing. While research has been conducted on the effects of online technology in first language reading and writing, this article explores how online technology affects second and foreign language writing. The goal of this…

  12. Mobile Assisted Language Learning: Review of the Recent Applications of Emerging Mobile Technologies

    Science.gov (United States)

    Yang, Jaeseok

    2013-01-01

    As mobile computing technologies have been more powerful and inclusive in people's daily life, the issue of mobile assisted language learning (MALL) has also been widely explored in CALL research. Many researches on MALL consider the emerging mobile technologies have considerable potentials for the effective language learning. This review study…

  13. X-ray computed tomography for additive manufacturing: a review

    Science.gov (United States)

    Thompson, A.; Maskery, I.; Leach, R. K.

    2016-07-01

    In this review, the use of x-ray computed tomography (XCT) is examined, identifying the requirement for volumetric dimensional measurements in industrial verification of additively manufactured (AM) parts. The XCT technology and AM processes are summarised, and their historical use is documented. The use of XCT and AM as tools for medical reverse engineering is discussed, and the transition of XCT from a tool used solely for imaging to a vital metrological instrument is documented. The current states of the combined technologies are then examined in detail, separated into porosity measurements and general dimensional measurements. In the conclusions of this review, the limitation of resolution on improvement of porosity measurements and the lack of research regarding the measurement of surface texture are identified as the primary barriers to ongoing adoption of XCT in AM. The limitations of both AM and XCT regarding slow speeds and high costs, when compared to other manufacturing and measurement techniques, are also noted as general barriers to continued adoption of XCT and AM.

  14. Diabetes Monitoring System Using Mobile Computing Technologies

    Directory of Open Access Journals (Sweden)

    Mashael Saud Bin-Sabbar

    2013-03-01

    Full Text Available Diabetes is a chronic disease that needs to regularly be monitored to keep the blood sugar levels within normal ranges. This monitoring depends on the diabetic treatment plan that is periodically reviewed by the endocrinologist. The frequent visit to the main hospital seems to be tiring and time consuming for both endocrinologist and diabetes patients. The patient may have to travel to the main city, paying a ticket and reserving a place to stay. Those expenses can be reduced by remotely monitoring the diabetes patients with the help of mobile devices. In this paper, we introduce our implementation of an integrated monitoring tool for the diabetes patients. The designed system provides a daily monitoring and monthly services. The daily monitoring includes recording the result of daily analysis and activates to be transmitted from a patient’s mobile device to a central database. The monthly services require the patient to visit a nearby care center in the patient home town to do the medical examination and checkups. The result of this visit entered into the system and then synchronized with the central database. Finally, the endocrinologist can remotely monitor the patient record and adjust the treatment plan and the insulin doses if need.

  15. Computational mask defect review for contamination and haze inspections

    Science.gov (United States)

    Morgan, Paul; Rost, Daniel; Price, Daniel; Corcoran, Noel; Satake, Masaki; Hu, Peter; Peng, Danping; Yonenaga, Dean; Tolani, Vikram; Wolf, Yulian; Shah, Pinkesh

    2013-09-01

    As optical lithography continues to extend into sub-0.35 k1 regime, mask defect inspection and subsequent review has become tremendously challenging, and indeed the largest component to mask manufacturing cost. The routine use of various resolution enhancement techniques (RET) have resulted in complex mask patterns, which together with the need to detect even smaller defects due to higher MEEFs, now requires an inspection engineer to use combination of inspection modes. This is achieved in 193nm AeraTM mask inspection systems wherein masks are not only inspected at their scanner equivalent aerial exposure conditions, but also at higher Numerical Aperture resolution, and special reflected-light, and single-die contamination modes, providing better coverage over all available patterns, and defect types. Once the required defects are detected by the inspection system, comprehensively reviewing and dispositioning each defect then becomes the Achilles heel of the overall mask inspection process. Traditionally, defects have been reviewed manually by an operator, which makes the process error-prone especially given the low-contrast in the convoluted aerial images. Such manual review also limits the quality and quantity of classifications in terms of the different types of characterization and number of defects that can practically be reviewed by a person. In some ways, such manual classification limits the capability of the inspection tool itself from being setup to detect smaller defects since it often results in many more defects that need to be then manually reviewed. Paper 8681-109 at SPIE Advanced Lithography 2013 discussed an innovative approach to actinic mask defect review using computational technology, and focused on Die-to-Die transmitted aerial and high-resolution inspections. In this approach, every defect is characterized in two different ways, viz., quantitatively in terms of its print impact on wafer, and qualitatively in terms of its nature and origin in

  16. A Study of Computing Undergraduates Undertaking a Systematic Literature Review

    Science.gov (United States)

    Brereton, P.

    2011-01-01

    Teaching computing students about the importance of evidence and about the use of empirical methods for evaluating computing technologies can be difficult, especially within dual honors undergraduate degree programs. The aims of this study were to explore the effectiveness of second-year undergraduate computing students in carrying out a…

  17. A Study of Computing Undergraduates Undertaking a Systematic Literature Review

    Science.gov (United States)

    Brereton, P.

    2011-01-01

    Teaching computing students about the importance of evidence and about the use of empirical methods for evaluating computing technologies can be difficult, especially within dual honors undergraduate degree programs. The aims of this study were to explore the effectiveness of second-year undergraduate computing students in carrying out a…

  18. COMPUTER VISION SYNDROME: A SHORT REVIEW

    National Research Council Canada - National Science Library

    Sameena; Mohd Inayatullah

    2012-01-01

    .... The increased usage of computers have lead to variety of ocular symptoms which includ es eye strain, tired eyes, irritation, redness, blurred vision, and diplopia, collectively referred to as Computer Vision Syndrome (CVS...

  19. Extending the horizons advances in computing, optimization, and decision technologies

    CERN Document Server

    Joseph, Anito; Mehrotra, Anuj; Trick, Michael

    2007-01-01

    Computer Science and Operations Research continue to have a synergistic relationship and this book represents the results of cross-fertilization between OR/MS and CS/AI. It is this interface of OR/CS that makes possible advances that could not have been achieved in isolation. Taken collectively, these articles are indicative of the state-of-the-art in the interface between OR/MS and CS/AI and of the high caliber of research being conducted by members of the INFORMS Computing Society. EXTENDING THE HORIZONS: Advances in Computing, Optimization, and Decision Technologies is a volume that presents the latest, leading research in the design and analysis of algorithms, computational optimization, heuristic search and learning, modeling languages, parallel and distributed computing, simulation, computational logic and visualization. This volume also emphasizes a variety of novel applications in the interface of CS, AI, and OR/MS.

  20. Computer technology in education and issues of power and equity

    Directory of Open Access Journals (Sweden)

    Alper Kesten

    2010-05-01

    Full Text Available This study aims to use ‘techniques of power’ classified (based on Foucault’s work by Gore in order to illustrate power relations between supporters (or non-supporters of computer technology and teachers. For this purpose, six out of eight techniques of power (surveillance, normalization, exclusion, classification, distribution and regulation is used in formulating thoughts about computer technology and issues of power and equity. In this study, these techniques of power were discussed more detailed both to exemplify how supporters (or non-supporters of computer technology exercise power over teachers (preservice or inservice by using of major techniques of power and to show how they are related to the issue of equity.

  1. Use of computer technology to enhance immigrant families' adaptation.

    Science.gov (United States)

    Tsai, Jenny Hsin-Chun

    2006-01-01

    To summarize how computer technology influenced immigrant families' adaptation to life in the United States. Critical ethnography. Data were collected from 1998 to 2000 from 13 parents and 16 children from nine Taiwanese immigrant families using semi-structured interviews and a questionnaire. Narrative analysis was used with interview data. Participants faced the demands of language proficiency, economic survival, loss of social networks, and social disconnection during resettlement. Computer technology provided participants with new occupational opportunities and strategies to overcome the barriers and stress created by resettlement. Internet and E-mail access greatly facilitated these participant families' adaptation. Study findings warrant further exploration to assess bow new computer technology promotes immigrant families' adaptation and alleviates stress associated with resettlement, including information about their health and health care.

  2. A comprehensive review on proppant technologies

    Directory of Open Access Journals (Sweden)

    Feng Liang

    2016-03-01

    Full Text Available The main function of traditional proppants is to provide and maintain conductive fractures during well production where proppants should meet closure stress requirement and show resistance to diagenesis under downhole conditions. Many different proppants have been developed in the oil & gas industry, with various types, sizes, shapes, and applications. While most proppants are simply made of silica or ceramics, advanced proppants like ultra-lightweight proppant is also desirable since it reduces proppant settling and requires low viscosity fluids to transport. Additionally, multifunctional proppants may be used as a crude way to detect hydraulic fracture geometry or as matrices to slowly release downhole chemical additives, besides their basic function of maintaining conductive hydraulic fractures. Different from the conventional approach where proppant is pumped downhole in frac fluids, a revolutionary way to generate in-situ spherical proppants has been reported recently. This paper presents a comprehensive review of over 100 papers published in the past several decades on the subject. The objectives of this review study are to provide an overview of current proppant technologies, including different types, compositions, and shapes of proppants, new technologies to pump and organize proppants downhole such as channel fracturing, and also in-situ proppant generation. Finally, the paper sheds light on the current challenges and emphasizes needs for new proppant development for unconventional resources.

  3. A Critical Review on Superchilling Preservation Technology in Aquatic Product

    Institute of Scientific and Technical Information of China (English)

    WU Chun-hua; YUan Chun-hong; YE Xing-qian; HU Ya-qin; CHEn Shi-guo; and LiU Dong-hong

    2014-01-01

    aquatic product, known as one of the good resources for white meat, has been widely accepted by the consumers due to its high protein, low fat, especially low cholesterol. With the fast development of living standards around the world, the consumer demands for high quality, nutrition, safety and freshness of ifshery food are increasing. Thus, high efifcient preservation technologies for aquatic products become particularly important. Superchilling is one of the controlled-temperature preservation technologies for seafood. Aquatic products can be kept in better quality under superchilling conditions. This review introduced the principle and development of superchilling process, mainly focusing on research progresses and technical dififculties of superchilling. The growth mechanism of ice crystals and the feasibility of application of computational lfuid dynamics in analyzing the temperatures variation and ice crystals during superchilling progress were also discussed, which will provide theoretical foundation for its improvement and application.

  4. Computer-Aided Medical Diagnosis. Literature Review

    Science.gov (United States)

    1978-12-15

    BOUCKAERT, A., Computer-aided diagnosis of goitres in a cancer department, Int. J. Bio-’Med. Comput., 3 (1972) p. 3. BOYLE, J. A., GREIG, W. R., FRANKLIN, D...toxic goitre , Q. J. Med., 35 (1966) p. 565. Bricetti, A. B. and Bleich, H. L., A computer program that evaluates patients with hypercalcemia, J

  5. A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues.

    Science.gov (United States)

    Nilles, Jack M.; And Others

    A technology assessment of personal computers was conducted to study both the socially desirable and undesirable impacts of this new technology in three main areas: education, employment, and international trade. Information gleaned from this study was then used to generate suggestions for public policy options which could influence these impacts.…

  6. Survival Mode: The Stresses and Strains of Computing Curricula Review

    Science.gov (United States)

    Tan, Grace; Venables, Anne

    2008-01-01

    In an ideal world, review and changes to computing curricula should be driven solely by academic concerns for the needs of students. The process should be informed by industry accreditation processes and international best practice (Hurst et al., 2001). However, Australian computing curricular review is often driven by the need for financial…

  7. A Review of Ultrasonic Nano Manipulation Technology

    Institute of Scientific and Technical Information of China (English)

    Junhui Hu∗

    2016-01-01

    Nano manipulation technology has great potential applications in the assembly, measurement and fabrication of nano materials, actuating and high-sensitivity sensing of biological samples, manufacture of nano sensors, decontamination of air and water, etc. As an actuating technology which is far from being mature, the nano manipulation still faces lots of challenges in the device principles, design, scaling up, sample safety, etc. The ultrasonic nano manipulation, in which nanoscale objects are handled and actuated by controlled ultrasound, is an emerging technology to meet some of challenges in nano manipulations. The author’ s research team and other groups have proposed and realized a series of nano manipulation functions such as trapping, transfer, rotation and concentration since 2012, by controlled ultrasound. Compared with other nano manipulating techniques, the ultrasonic method has the merits such as very low temperature rise at the manipulation area, little selectivity to the material properties of manipulated samples, capability of being implemented on the substrates without MENS or NEMS structure, etc. This paper reviews the progresses in principles, functions, structures and characteristics of the ultrasonic devices for nano manipulations.

  8. Science & Technology Review October/November 2016

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, R. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meissner, C. N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kotta, P. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-11-11

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world. The Laboratory is operated by Lawrence Livermore National Security, LLC (LLNS), for the Department of Energy’s National Nuclear Security Administration. LLNS is a partnership involving Bechtel National, University of California, Babcock & Wilcox, Washington Division of URS Corporation, and Battelle in affiliation with Texas A&M University. More information about LLNS is available online at www.llnsllc.com. Please address any correspondence (including name and address changes) to S&TR, Mail Stop L-664, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, California 94551, or telephone (925) 423-3893. Our e-mail address is str-mail@llnl.gov. S&TR is available on the Web at str.llnl.gov.

  9. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  10. Field-programmable custom computing technology architectures, tools, and applications

    CERN Document Server

    Luk, Wayne; Pocek, Ken

    2000-01-01

    Field-Programmable Custom Computing Technology: Architectures, Tools, and Applications brings together in one place important contributions and up-to-date research results in this fast-moving area. In seven selected chapters, the book describes the latest advances in architectures, design methods, and applications of field-programmable devices for high-performance reconfigurable systems. The contributors to this work were selected from the leading researchers and practitioners in the field. It will be valuable to anyone working or researching in the field of custom computing technology. It serves as an excellent reference, providing insight into some of the most challenging issues being examined today.

  11. Team Viewer Technology for Remote Control of a Computer

    Directory of Open Access Journals (Sweden)

    Cornelia Victoria Anghel Drugarin

    2016-10-01

    Full Text Available Team Viewer software is used to remote control our PC. We can use this remote control technology to desktop sharing, online conferences and for file transfer between computers. Basically, using this software, you can ask for help a friend, or professional software to solve problems from a distance, without it having to be physically go to each client / friend in part. After installed and configured Team Viewer application, is complete, we can remote control the computer.

  12. Computer-aided Translation Technology and Its Applications

    Institute of Scientific and Technical Information of China (English)

    汪美侠; 何大顺

    2014-01-01

    This article begins with a brief analysis of the significance of translation technology in different spheres of modern life, followed by a distinction between machine translation (MT) and computer-aided translation (CAT). It then describes some trans-lation resources and tools and examines the negative and positive aspects of computer-aided translations. Finally it comes to a conclusion that it would be greatly efficient and productive for the translators to acquire the new skills in the translation work-place.

  13. JPRS Report, Science & Technology, Europe, First International Computers Communications Conference

    Science.gov (United States)

    2007-11-02

    Hong Kong Telephone has employed fibre optic technology in its transmission network since 1981. Fibre optic transmission systems are used to...leased datalines. The potentials of fibre optic systems are large, and in this paper, some examples will be given to illustrate how the attributes of... fibre optic systems are exploited in Hong Kong Telephone. This report of Science & Technology Europe, First International Computers Communications Conference.

  14. 9 Waste Rubber Technologies Passed the Review on Advanced Applicable Technologies by MIIT

    Institute of Scientific and Technical Information of China (English)

    Qiart Bozhang

    2012-01-01

    To promote the development of integrative utilization technologies of industrial solid wastes and to enhance the level of integrative utilization, the Ministry of Industry and Information Technology (MIIT) held Reviewing Meeting of Advanced Applicable Technologies for the Integrative Utilization of Industrial Solid Wastes on April 27. 9 integrative utilization technologies of waste rubber passed this review.

  15. Computer-generated slides: outdated technology or state-of-the-art presentation style?

    Science.gov (United States)

    Hinds, K F

    1998-01-01

    With the explosion of computerization, it appears that the business community is switching to computer-based presentations, projecting onto a screen directly from a computer, instead of the old standard of presenting with slides. However, the dental profession has been slow to follow. Although some speakers have switched to computer-based presentations, slides are still the standard in 1998. With the advent of numerous new computer software programs, clinicians are now able to generate highly sophisticated slides, that can be an equally powerful medium to communicate with the audience. Unfortunately, many clinicians are not taking advantage of the benefits of this technology. This article explains the simplicity of generating professional, high quality slides, reviews the major programs and equipment available to accomplish this task, and previews the multitude of applications this technology offers to practitioners as well as educators.

  16. BOOK REVIEW: Introduction to Computational Plasticity

    Science.gov (United States)

    Hartley, P.

    2006-04-01

    The use of computational modelling in all areas of science and engineering has in recent years escalated to the point where it underpins much of current research. However, the distinction must be made between computer systems in which no knowledge of the underlying computer technology or computational theory is required and those areas of research where the mastery of computational techniques is of great value, almost essential, for final year undergraduates or masters students planning to pursue a career in research. Such a field of research in the latter category is continuum mechanics, and in particular non-linear material behaviour, which is the core topic of this book. The focus of the book on computational plasticity embodies techniques of relevance not only to academic researchers, but also of interest to industrialists engaged in the production of components using bulk or sheet forming processes. Of particular interest is the guidance on how to create modules for use with the commercial system Abaqus for specific types of material behaviour. The book is in two parts, the first of which contains six chapters, starting with microplasticity, but predominantly on continuum plasticity. The first chapter on microplasticty gives a brief description of the grain structure of metals and the existence of slip systems within the grains. This provides an introduction to the concept of incompressibility during plastic deformation, the nature of plastic yield and the importance of the critically resolved shear stress on the slip planes (Schmid's law). Some knowledge of the notation commonly used to describe slip systems is assumed, which will be familiar to students of metallurgy, but anyone with a more general engineering background may need to undertake additional reading to understand the various descriptions. Any lack of knowledge in this area however, is of no disadvantage as it serves only as an introduction and the book moves on quickly to continuum plasticity

  17. Science & Technology Review November/December 2008

    Energy Technology Data Exchange (ETDEWEB)

    Bearinger, J P

    2008-10-07

    This months issue has the following articles: (1) Innovation Is Key to Prosperity and Security --Commentary by Erik J. Stenehjem; (2) Taking Ultrafast Snapshots of Material Changes--The dynamic transmission electron microscope captures images a million times faster than conventional instruments; (3) Automated Technology for Laser Fusion Systems--The first completely computer-controlled system for aligning laser beams is helping make fusion research possible; (4) Protecting the Nation through Secure Cargo--A new device tracks and monitors cargo containers during transit to improve national security; (5) Atom by Atom, Layer by Layer--Extremely thin sandwiches of materials called nanolaminates exhibit remarkable, highly useful properties; and (6) Predicting the Bizarre Properties of Plutonium--A supercomputing 'grand challenge' team has made highly precise predictions of the behavior of plutonium's most important solid phase.

  18. Science & Technology Review January/February 2010

    Energy Technology Data Exchange (ETDEWEB)

    Bearinger, J P

    2009-11-30

    This month's issue has the following articles: (1) Innovative Materials Rise to the Radiation Challenge - Commentary by Bruce Warner; (2) The Hunt for Better Radiation Detection - New materials will help radiation detectors pick up weak signals and accurately identify illicit radioactive sources; (3) Time-Critical Technology Identifies Deadly Bloodborne Pathogens - A portable device can simultaneously distinguish up to five bloodborne pathogens in just minutes; (4) Defending Computer Networks against Attack - A Laboratory effort takes a new approach to detecting increasingly sophisticated cyber attacks; and (5) Imaging Cargo's Inner Secrets - Livermore-University of California collaborators are modeling a new radiographic technique for identifying nuclear materials concealed inside cargo containers.

  19. RISK MANAGEMENT FRAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW

    OpenAIRE

    Mohammad Alnuem2

    2016-01-01

    Cloud computing technology has experienced exponential growth over the past few years. It provides many advantages for both individuals and organizations. However, at the same time, many issues have arisen due to the vast growth of cloud computing. Organizations often have concerns about the migration and utilization of cloud computing due to the loss of control over their outsourced resources and cloud computing is vulnerable to risks. Thus, a cloud provider needs to manage the cloud comp...

  20. Fundamentals of grid computing theory, algorithms and technologies

    CERN Document Server

    2010-01-01

    This volume discusses how the novel technologies of semantic web and workflow have been integrated into the grid and grid services. It focuses on sharing resources, data replication, data management, fault tolerance, scheduling, broadcasting, and load balancing algorithms. The book discusses emerging developments in grid computing, including cloud computing, and explores large-scale computing in high energy physics, weather forecasting, and more. The contributors often use simulations to evaluate the performance of models and algorithms. In the appendices, they present two types of easy-to-use open source software written in Java

  1. Voice over IP: how computing technology is being used in mobile communications.

    Science.gov (United States)

    Johnson, William

    2005-01-01

    This article explains how computing technology was used to address the need for mobile communications among nursing staff. In 2004, nursing staff at Fauquier Hospital relocated from one nursing floor in an older building to two floors in a new structure. This resulted in complaints and supervision issues as nursing managers, who had previously been relatively sedentary, now became quite mobile as they attempted to control nursing operations on two separate floors. Complaints arose from several sources. Nursing staff and managers both complained about the increased difficulty in communicating with each other Physicians expressed frustration to hospital administration at playing "telephone tag" with managers. The solution involved Internet Protocol technology that is in widespread use on most computer networks. The article details how this technology was selected over several other communications technologies and used to implement wireless telephony over the hospital's existing computer network. It reviews key standards and technologies and issues surrounding their use. Finally, the article demonstrates how this computing technology improved patient care by facilitating mobile communications.

  2. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  3. COMPUTER VISION SYNDROME: A SHORT REVIEW.

    OpenAIRE

    Sameena; Mohd Inayatullah

    2012-01-01

    Computers are probably one of the biggest scientific inventions of the modern era, and since then they have become an integral part of our life. The increased usage of computers have lead to variety of ocular symptoms which includ es eye strain, tired eyes, irritation, redness, blurred vision, and diplopia, collectively referred to as Computer Vision Syndrome (CVS). CVS may have a significant impact not only on visual com fort but also occupational productivit...

  4. 78 FR 11902 - Review of Gun Safety Technologies

    Science.gov (United States)

    2013-02-20

    ... of Justice Programs Review of Gun Safety Technologies AGENCY: National Institute of Justice, JPO, DOJ...) is conducting a review of existing and emerging gun safety technologies and plans to issue a report... to help inform its technology assessment and market research of existing and emerging gun...

  5. Information Technology in project-organized electronic and computer technology engineering education

    DEFF Research Database (Denmark)

    Nielsen, Kirsten Mølgaard; Nielsen, Jens Frederik Dalsgaard

    1999-01-01

    This paper describes the integration of IT in the education of electronic and computer technology engineers at Institute of Electronic Systems, Aalborg Uni-versity, Denmark. At the Institute Information Technology is an important tool in the aspects of the education as well as for communication...

  6. The Adoption of Grid Computing Technology by Organizations: A Quantitative Study Using Technology Acceptance Model

    Science.gov (United States)

    Udoh, Emmanuel E.

    2010-01-01

    Advances in grid technology have enabled some organizations to harness enormous computational power on demand. However, the prediction of widespread adoption of the grid technology has not materialized despite the obvious grid advantages. This situation has encouraged intense efforts to close the research gap in the grid adoption process. In this…

  7. Science and Technology Review June 2002

    Energy Technology Data Exchange (ETDEWEB)

    Budil, K.

    2002-06-01

    This Science and Technology Review has the following stories: (1) Fighting Bioterrorism, Fighting Cancer; (2) A Two-Pronged Attack on Bioterrorism--synthetic two-legged molecules will be excellent detectors of biowarfare agents and cancer cells; (3) Adaptive Optics Sharpen the View from Earth--astronomers are obtaining images with unprecedented resolution, thanks to telescopes equipped with adaptive optics developed at Livermore; (4) Experiments Re-create X Rays from Comets--Experiments using the Laboratory's electron beam ion trap and an x-ray spectrometer designed by the National Aeronautics and Space Administration are shedding light on how comets emit x rays as they pass the Sun; (5) Chemistry--50 Years of exploring the Material World--from isotopic analysis to atomic-level simulations of material behavior, Livermore's chemists and materials scientists apply their expertise to fulfill the Laboratory's mission.

  8. Troubling Discourse: Basic Writing and Computer-Mediated Technologies

    Science.gov (United States)

    Jonaitis, Leigh A.

    2012-01-01

    Through an examination of literature in the fields of Basic Writing and developmental education, this essay provides some historical perspective and examines the prevalent discourses on the use of computer-mediated technologies in the basic writing classroom. The author uses Bertram Bruce's (1997) framework of various "stances" on…

  9. Creating the Environment for the Prosperity of Cloud Computing Technology

    Directory of Open Access Journals (Sweden)

    Wen-Hsing Lai

    2012-08-01

    Full Text Available The key point for the success of clouding computing technology in terms of application is whether such operation can produce the sense of trustworthiness to its users. Technical measurement has always been the fundamental preventive precaution, no matter what kind of aspect in dealing with producing the sense of trustworthiness.  Except technical measurement, there are two developing issues surrounding the central idea worth notice, which are the protection of information privacy and the jurisdictional issue. The main purpose of this article is to focus on the issue of protecting information privacy and jurisdictional problem through the newly developed cloud computing technology. This article will first introduce the characteristics of cloud computing technology in order to pave the way for further discussion. Then the issue of protecting information privacy and jurisdictional problem will be discussed through disparity of legal protection of information privacy and principles for asserting jurisdiction within Internet. The personal observation and suggestion will be made at the end of this article for a future possible adjustment of infrastructure for the protection of information privacy and jurisdictional decision within cyberspace in order to promote the sense of trustworthiness of the cloud computing technology user.

  10. Computer-Assisted Foreign Language Teaching and Learning: Technological Advances

    Science.gov (United States)

    Zou, Bin; Xing, Minjie; Wang, Yuping; Sun, Mingyu; Xiang, Catherine H.

    2013-01-01

    Computer-Assisted Foreign Language Teaching and Learning: Technological Advances highlights new research and an original framework that brings together foreign language teaching, experiments and testing practices that utilize the most recent and widely used e-learning resources. This comprehensive collection of research will offer linguistic…

  11. Application and prospect of computer technology in welding materials field

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper summarizes the application status of computer technology in welding materials field from three aspects: the CAD of welding materials, the date base system for welding materials and the expert system for welding materials .Besides, this paper explores and discusses the existing problems and the developing trend in the future.

  12. Computer Technology Integration and Student Learning: Barriers and Promise

    Science.gov (United States)

    Keengwe, Jared; Onchwari, Grace; Wachira, Patrick

    2008-01-01

    Political and institutional support has enabled many institutions of learning to spend millions of dollars to acquire educational computing tools (Ficklen and Muscara, "Am Educ" 25(3):22-29, 2001) that have not been effectively integrated into the curriculum. While access to educational technology tools has remarkably improved in most schools,…

  13. Computer Software for Forestry Technology Curricula. Final Report.

    Science.gov (United States)

    Watson, Roy C.; Scobie, Walter R.

    Since microcomputers are being used more and more frequently in the forest products industry in the Pacific Northwest, Green River Community College conducted a project to search for BASIC language computer programs pertaining to forestry, and when possible, to adapt such software for use in teaching forestry technology. The search for applicable…

  14. Computational Structures Technology for Airframes and Propulsion Systems

    Science.gov (United States)

    Noor, Ahmed K. (Compiler); Housner, Jerrold M. (Compiler); Starnes, James H., Jr. (Compiler); Hopkins, Dale A. (Compiler); Chamis, Christos C. (Compiler)

    1992-01-01

    This conference publication contains the presentations and discussions from the joint University of Virginia (UVA)/NASA Workshops. The presentations included NASA Headquarters perspectives on High Speed Civil Transport (HSCT), goals and objectives of the UVA Center for Computational Structures Technology (CST), NASA and Air Force CST activities, CST activities for airframes and propulsion systems in industry, and CST activities at Sandia National Laboratory.

  15. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  16. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  17. Biosensor technology for pesticides--a review.

    Science.gov (United States)

    Verma, Neelam; Bhardwaj, Atul

    2015-03-01

    Pesticides, due to their lucrative outcomes, are majorly implicated in agricultural fields for crop production enhancement. Due to their pest removal properties, pesticides of various classes have been designed to persist in the environment over a longer duration after their application to achieve maximum effectiveness. Apart from their recalcitrant structure and agricultural benefits, pesticides also impose acute toxicological effects onto the other various life forms. Their accumulation in the living system may prove to be detrimental if established in higher concentrations. Thus, their prompt and accurate analysis is a crucial matter of concern. Conventional techniques like chromatographic techniques (HPLC, GC, etc.) used for pesticides detection are associated with various limitations like stumpy sensitivity and efficiency, time consumption, laboriousity, requirement of expensive equipments and highly trained technicians, and many more. So there is a need to recruit the methods which can detect these neurotoxic compounds sensitively, selectively, rapidly, and easily in the field. Present work is a brief review of the pesticide effects, their current usage scenario, permissible limits in various food stuffs and 21st century advancements of biosensor technology for pesticide detection. Due to their exceptional performance capabilities, easiness in operation and on-site working, numerous biosensors have been developed for bio-monitoring of various environmental samples for pesticide evaluation immensely throughout the globe. Till date, based on sensing element (enzyme based, antibody based, etc.) and type of detection method used (Electrochemical, optical, and piezoelectric, etc.), a number of biosensors have been developed for pesticide detection. In present communication, authors have summarized 21st century's approaches of biosensor technology for pesticide detection such as enzyme-based biosensors, immunosensors, aptamers, molecularly imprinted polymers, and

  18. Providing Assistive Technology Applications as a Service Through Cloud Computing.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.

  19. Innovative Use of Cloud Computing in Smart Phone Technology

    Directory of Open Access Journals (Sweden)

    Vaibhav Rana

    2013-07-01

    Full Text Available This paper elaborates the vital and innovative use of Cloud computing in the field of Smart Phone Technology. In the proposed environment there is a cloud server installed at the central place called as cloud center of mobile computing. The function of cloud computing is to accept the request of the end users and process the required applications accordingly. Henceforth this server is fully equipped with all advance ICT infrastructure, mobile communication utilities and full security measure, so that every feature can be used with full security. All users are having equal priority to get connection with the cloud server and use every application as well as each function equally. Due to use of this modern technology the main advantage is that a single entity is being used by many remote users for various requirements at the same time without occupying much space and infrastructure. The resulting new paradigm of mobile cloud computing is being embraced by researchers, professionals and practitioners as an exciting new way to extend the capabilities of mobile devices and mobile platforms. This has the potential for profound impacts on the business environment and people's daily life. The most salient feature of the system is that by the use of this infrastructure we can perform mobile communication and electronic communication by a single unit and the same communication spectrum. The presented cloud computing technology offers a natural solution for expending the limited capabilities of mobile devices. This process makes the whole communication system cost effective, efficient, transparent, modular system.

  20. Human-Computer Etiquette Cultural Expectations and the Design Implications They Place on Computers and Technology

    CERN Document Server

    Hayes, Caroline C

    2010-01-01

    Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in t

  1. Guide to cloud computing for business and technology managers from distributed computing to cloudware applications

    CERN Document Server

    Kale, Vivek

    2014-01-01

    Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book:Introduces the enterprise applications integration (EAI) solutions that were a first ste

  2. Review of Biojet Fuel Conversion Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Wei-Cheng [National Renewable Energy Lab. (NREL), Golden, CO (United States); Tao, Ling [National Renewable Energy Lab. (NREL), Golden, CO (United States); Markham, Jennifer [National Renewable Energy Lab. (NREL), Golden, CO (United States); Zhang, Yanan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Tan, Eric [National Renewable Energy Lab. (NREL), Golden, CO (United States); Batan, Liaw [National Renewable Energy Lab. (NREL), Golden, CO (United States); Warner, Ethan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Biddy, Mary [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-07-01

    Biomass-derived jet (biojet) fuel has become a key element in the aviation industry’s strategy to reduce operating costs and environmental impacts. Researchers from the oil-refining industry, the aviation industry, government, biofuel companies, agricultural organizations, and academia are working toward developing commercially viable and sustainable processes that produce long-lasting renewable jet fuels with low production costs and low greenhouse gas emissions. Additionally, jet fuels must meet ASTM International specifications and potentially be a 100% drop-in replacement for the current petroleum jet fuel. The combustion characteristics and engine tests demonstrate the benefits of running the aviation gas turbine with biojet fuels. In this study, the current technologies for producing renewable jet fuels, categorized by alcohols-to-jet, oil-to-jet, syngas-to-jet, and sugar-to-jet pathways, are reviewed. The main challenges for each technology pathway, including feedstock availability, conceptual process design, process economics, life-cycle assessment of greenhouse gas emissions, and commercial readiness, are discussed. Although the feedstock price and availability and energy intensity of the process are significant barriers, biomass-derived jet fuel has the potential to replace a significant portion of conventional jet fuel required to meet commercial and military demand.

  3. Overview of European technology in computers, telecommunications, and electronics

    Science.gov (United States)

    Blackburn, J. F.

    1990-05-01

    The emergence of the personal computer, the growing use of distributed systems, and the increasing demand for supercomputers and mini-supercomputers are causing a profound impact on the European computer market. An equally profound development in telecommunications is the integration of voice, data, and images in the public network systems - the Integrated Service Digital Network (ISDN). The programs being mounted in Europe to meet the challenges of these technologies are described. The Europe-wide trends and actions with respect to computers, telecommunications, and microelectronics are discussed, and the major European collaborative programs in these fields are described. Specific attention is given to the European Strategic Programme for Research and Development in Information (ESPRIT); Research in Advanced Communications for Europe (RACE); European Research Coordination Agency (Eureka) programs; Joint European Submicron Silicon Initiative (JESSI); and the recently combined programs Basic Research Industrial Technologies in Europe/European Research in Advanced Materials (BRITE/EURAM).

  4. REVIEW PAPER ON MOBILE CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Priyanka d. Raut

    2015-10-01

    Full Text Available Nowadays smart-phones are being capable of supporting a broad range of applications, many of which demand an increasing computational power. This leads to a challenge because smart-phones are resource-constrained devices with finite computation power, memory, storage, and energy. With the development of mobility and cloud computing, mobile cloud computing (MCC has introduced and become a point of research. With the need of extendibility and on-demand self-service, it can provide the good infrastructure, platform and software services in a cloud to mobile clients through the mobile network. Therefore, Cloud computing is anticipated to bring an innovation in mobile computing, where the mobile devices can make use of clouds for data processing, storage and other intensive operations. Despite the surprising advancement achieved by MCC, the clients of MCC are still below expectations due to the related risks in terms of security and confidentiality. The more and more information is placed onto the cloud by individuals and enterprises, the more the security issue begins to grow. This paper presents the various security issues that arise about how secure the mobile cloud computing environment is.

  5. Review: Human Intracortical recording and neural decoding for brain-computer interfaces.

    Science.gov (United States)

    Brandman, David M; Cash, Sydney S; Hochberg, Leigh R

    2017-03-02

    Brain Computer Interfaces (BCIs) use neural information recorded from the brain for voluntary control of external devices. The development of BCI systems has largely focused on improving functional independence for individuals with severe motor impairments, including providing tools for communication and mobility. In this review, we describe recent advances in intracortical BCI technology and provide potential directions for further research.

  6. 2002 Computing and Interdisciplinary Systems Office Review and Planning Meeting

    Science.gov (United States)

    Lytle, John; Follen, Gregory; Lopez, Isaac; Veres, Joseph; Lavelle, Thomas; Sehra, Arun; Freeh, Josh; Hah, Chunill

    2003-01-01

    The technologies necessary to enable detailed numerical simulations of complete propulsion systems are being developed at the NASA Glenn Research Center in cooperation with NASA Glenn s Propulsion program, NASA Ames, industry, academia and other government agencies. Large scale, detailed simulations will be of great value to the nation because they eliminate some of the costly testing required to develop and certify advanced propulsion systems. In addition, time and cost savings will be achieved by enabling design details to be evaluated early in the development process before a commitment is made to a specific design. This year s review meeting describes the current status of the NPSS and the Object Oriented Development Kit with specific emphasis on the progress made over the past year on air breathing propulsion applications for aeronautics and space transportation applications. Major accomplishments include the first 3-D simulation of the primary flow path of a large turbofan engine in less than 15 hours, and the formal release of the NPSS Version 1.5 that includes elements of rocket engine systems and a visual based syntax layer. NPSS and the Development Kit are managed by the Computing and Interdisciplinary Systems Office (CISO) at the NASA Glenn Research Center and financially supported in fiscal year 2002 by the Computing, Networking and Information Systems (CNIS) project managed at NASA Ames, the Glenn Aerospace Propulsion and Power Program and the Advanced Space Transportation Program.

  7. Computer Review Can Cut HVAC Energy Use

    Science.gov (United States)

    McClure, Charles J. R.

    1974-01-01

    A computerized review of construction bidding documents, usually done by a consulting engineer, can reveal how much money it will cost to operate various alternative types of HVAC equipment over a school's lifetime. The review should include a computerized load calculation, energy systems flow diagram, control system analysis, and a computerized…

  8. Computer Review Can Cut HVAC Energy Use

    Science.gov (United States)

    McClure, Charles J. R.

    1974-01-01

    A computerized review of construction bidding documents, usually done by a consulting engineer, can reveal how much money it will cost to operate various alternative types of HVAC equipment over a school's lifetime. The review should include a computerized load calculation, energy systems flow diagram, control system analysis, and a computerized…

  9. Research on application of computer technologies in jewelry process

    Directory of Open Access Journals (Sweden)

    Junbo Xia

    2017-02-01

    Full Text Available Jewelry production is a process of precious raw materials and low losses in processing. The traditional manual mode is unable to meet the needs of enterprises in reality, while the involvement of computer technology can just solve this practical problem. At present, the problem of restricting the application for computer in jewelry production is mainly a failure to find a production model that can serve the whole industry chain with the computer as the core of production. This paper designs a “synchronous and diversified” production model with “computer aided design technology” and “rapid prototyping technology” as the core, and tests with actual production cases, and achieves certain results, which are forward-looking and advanced.

  10. Computational approaches for microalgal biofuel optimization: a review.

    Science.gov (United States)

    Koussa, Joseph; Chaiboonchoe, Amphun; Salehi-Ashtiani, Kourosh

    2014-01-01

    The increased demand and consumption of fossil fuels have raised interest in finding renewable energy sources throughout the globe. Much focus has been placed on optimizing microorganisms and primarily microalgae, to efficiently produce compounds that can substitute for fossil fuels. However, the path to achieving economic feasibility is likely to require strain optimization through using available tools and technologies in the fields of systems and synthetic biology. Such approaches invoke a deep understanding of the metabolic networks of the organisms and their genomic and proteomic profiles. The advent of next generation sequencing and other high throughput methods has led to a major increase in availability of biological data. Integration of such disparate data can help define the emergent metabolic system properties, which is of crucial importance in addressing biofuel production optimization. Herein, we review major computational tools and approaches developed and used in order to potentially identify target genes, pathways, and reactions of particular interest to biofuel production in algae. As the use of these tools and approaches has not been fully implemented in algal biofuel research, the aim of this review is to highlight the potential utility of these resources toward their future implementation in algal research.

  11. Computational Approaches for Microalgal Biofuel Optimization: A Review

    Directory of Open Access Journals (Sweden)

    Joseph Koussa

    2014-01-01

    Full Text Available The increased demand and consumption of fossil fuels have raised interest in finding renewable energy sources throughout the globe. Much focus has been placed on optimizing microorganisms and primarily microalgae, to efficiently produce compounds that can substitute for fossil fuels. However, the path to achieving economic feasibility is likely to require strain optimization through using available tools and technologies in the fields of systems and synthetic biology. Such approaches invoke a deep understanding of the metabolic networks of the organisms and their genomic and proteomic profiles. The advent of next generation sequencing and other high throughput methods has led to a major increase in availability of biological data. Integration of such disparate data can help define the emergent metabolic system properties, which is of crucial importance in addressing biofuel production optimization. Herein, we review major computational tools and approaches developed and used in order to potentially identify target genes, pathways, and reactions of particular interest to biofuel production in algae. As the use of these tools and approaches has not been fully implemented in algal biofuel research, the aim of this review is to highlight the potential utility of these resources toward their future implementation in algal research.

  12. Combining Brain-Computer Interfaces and Assistive Technologies: State-of-the-Art and Challenges

    Directory of Open Access Journals (Sweden)

    José del R. Millán

    2010-09-01

    Full Text Available In recent years, new research has brought the field of EEG-based Brain-Computer Interfacing (BCI out of its infancy and into a phase of relative maturity through many demonstrated prototypes such as brain-controlled wheelchairs, keyboards, and computer games. With this proof-of-concept phase in the past, the time is now ripe to focus on the development of practical BCI technologies that can be brought out of the lab and into real-world applications. In particular, we focus on the prospect of improving the lives of countless disabled individuals through a combination of BCI technology with existing assistive technologies (AT. In pursuit of more practical BCIs for use outside of the lab, in this paper, we identify four application areas where disabled individuals could greatly benefit from advancements in BCI technology, namely,“Communication & Control”, “Motor Substitution”, “Entertainment”, and “Motor Recovery”. We review the current state of the art and possible future developments, while discussing the main research issues in these four areas. In particular, we expect the most progress in the development of technologies such as hybrid BCI architectures, user-machine adaptation algorithms, the exploitation of users’ mental states for BCI reliability and confidence measures, the incorporation of principles in human-computer interaction (HCI to improve BCI usability, and the development of novel BCI technology including better EEG devices.

  13. Combining Brain-Computer Interfaces and Assistive Technologies: State-of-the-Art and Challenges.

    Science.gov (United States)

    Millán, J D R; Rupp, R; Müller-Putz, G R; Murray-Smith, R; Giugliemma, C; Tangermann, M; Vidaurre, C; Cincotti, F; Kübler, A; Leeb, R; Neuper, C; Müller, K-R; Mattia, D

    2010-01-01

    In recent years, new research has brought the field of electroencephalogram (EEG)-based brain-computer interfacing (BCI) out of its infancy and into a phase of relative maturity through many demonstrated prototypes such as brain-controlled wheelchairs, keyboards, and computer games. With this proof-of-concept phase in the past, the time is now ripe to focus on the development of practical BCI technologies that can be brought out of the lab and into real-world applications. In particular, we focus on the prospect of improving the lives of countless disabled individuals through a combination of BCI technology with existing assistive technologies (AT). In pursuit of more practical BCIs for use outside of the lab, in this paper, we identify four application areas where disabled individuals could greatly benefit from advancements in BCI technology, namely, "Communication and Control", "Motor Substitution", "Entertainment", and "Motor Recovery". We review the current state of the art and possible future developments, while discussing the main research issues in these four areas. In particular, we expect the most progress in the development of technologies such as hybrid BCI architectures, user-machine adaptation algorithms, the exploitation of users' mental states for BCI reliability and confidence measures, the incorporation of principles in human-computer interaction (HCI) to improve BCI usability, and the development of novel BCI technology including better EEG devices.

  14. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  15. Technologies for Foreign Language Learning: A Review of Technology Types and Their Effectiveness

    Science.gov (United States)

    Golonka, Ewa M.; Bowles, Anita R.; Frank, Victor M.; Richardson, Dorna L.; Freynik, Suzanne

    2014-01-01

    This review summarizes evidence for the effectiveness of technology use in foreign language (FL) learning and teaching, with a focus on empirical studies that compare the use of newer technologies with more traditional methods or materials. The review of over 350 studies (including classroom-based technologies, individual study tools,…

  16. Review your Computer Security Now and Frequently!

    CERN Multimedia

    IT Department

    2009-01-01

    The start-up of LHC is foreseen to take place in the autumn and we will be in the public spotlight again. This increases the necessity to be vigilant with respect to computer security and the defacement of an experiment’s Web page in September last year shows that we should be particularly attentive. Attackers are permanently probing CERN and so we must all do the maximum to reduce future risks. Security is a hierarchical responsibility and requires to balance the allocation of resources between making systems work and making them secure. Thus all of us, whether users, developers, system experts, administrators, or managers are responsible for securing our computing assets. These include computers, software applications, documents, accounts and passwords. There is no "silver bullet" for securing systems, which can only be achieved by a painstaking search for all possible vulnerabilities followed by their mitigation. Additional advice on particular topics can be obtained from the relevant I...

  17. Computational technology of multiscale modeling the gas flows in microchannels

    Science.gov (United States)

    Podryga, V. O.

    2016-11-01

    The work is devoted to modeling the gas mixture flows in engineering microchannels under conditions of many scales of computational domain. The computational technology of using the multiscale approach combining macro - and microscopic models is presented. At macrolevel the nature of the flow and the external influence on it are considered. As a model the system of quasigasdynamic equations is selected. At microlevel the correction of gasdynamic parameters and the determination of boundary conditions are made. As a numerical model the Newton's equations and the molecular dynamics method are selected. Different algorithm types used for implementation of multiscale modeling are considered. The results of the model problems for separate stages are given.

  18. Genetic Algorithm Modeling with GPU Parallel Computing Technology

    CERN Document Server

    Cavuoti, Stefano; Brescia, Massimo; Pescapé, Antonio; Longo, Giuseppe; Ventre, Giorgio

    2012-01-01

    We present a multi-purpose genetic algorithm, designed and implemented with GPGPU / CUDA parallel computing technology. The model was derived from a multi-core CPU serial implementation, named GAME, already scientifically successfully tested and validated on astrophysical massive data classification problems, through a web application resource (DAMEWARE), specialized in data mining based on Machine Learning paradigms. Since genetic algorithms are inherently parallel, the GPGPU computing paradigm has provided an exploit of the internal training features of the model, permitting a strong optimization in terms of processing performances and scalability.

  19. Digital image processing using parallel computing based on CUDA technology

    Science.gov (United States)

    Skirnevskiy, I. P.; Pustovit, A. V.; Abdrashitova, M. O.

    2017-01-01

    This article describes expediency of using a graphics processing unit (GPU) in big data processing in the context of digital images processing. It provides a short description of a parallel computing technology and its usage in different areas, definition of the image noise and a brief overview of some noise removal algorithms. It also describes some basic requirements that should be met by certain noise removal algorithm in the projection to computer tomography. It provides comparison of the performance with and without using GPU as well as with different percentage of using CPU and GPU.

  20. Technology computer aided design simulation for VLSI MOSFET

    CERN Document Server

    Sarkar, Chandan Kumar

    2013-01-01

    Responding to recent developments and a growing VLSI circuit manufacturing market, Technology Computer Aided Design: Simulation for VLSI MOSFET examines advanced MOSFET processes and devices through TCAD numerical simulations. The book provides a balanced summary of TCAD and MOSFET basic concepts, equations, physics, and new technologies related to TCAD and MOSFET. A firm grasp of these concepts allows for the design of better models, thus streamlining the design process, saving time and money. This book places emphasis on the importance of modeling and simulations of VLSI MOS transistors and

  1. Cloud computing and patient engagement: leveraging available technology.

    Science.gov (United States)

    Noblin, Alice; Cortelyou-Ward, Kendall; Servan, Rosa M

    2014-01-01

    Cloud computing technology has the potential to transform medical practices and improve patient engagement and quality of care. However, issues such as privacy and security and "fit" can make incorporation of the cloud an intimidating decision for many physicians. This article summarizes the four most common types of clouds and discusses their ideal uses, how they engage patients, and how they improve the quality of care offered. This technology also can be used to meet Meaningful Use requirements 1 and 2; and, if speculation is correct, the cloud will provide the necessary support needed for Meaningful Use 3 as well.

  2. There is a Significant Relationship Between Computer Attitudes and Library Anxiety Among African American Graduate Students. A review of: Jiao, Qun G., and Anthony J. Onwuegbuzie. “The Impact of Information Technology on Library Anxiety: The Role of Computer Attitudes.” Information Technology & Libraries 23.4 (Dec. 2004: 138 ‐44.

    Directory of Open Access Journals (Sweden)

    Gill Needham

    2007-03-01

    Full Text Available Objective – To investigate whether African American students’ computer attitudes predict levels of library anxiety. Design – A user study in which two instruments were administered to a group of graduate students to measure computer attitudes and library anxiety. Setting – The College of Education at an historically black college and university in the United States of America. Subjects – Ninety ‐four, predominantly female, African American graduate students, ranging in age from 22 ‐62 years old, and enrolled in either a statistics or a measurement course. Methods – Two instruments, the Computer Attitude Scale (CAS and the Library Anxiety Scale (LAS were administered to all the study participants. The Computer Anxiety Scale contains forty Likert ‐type items that assess individuals’ attitudes toward computers and their use. It includes four scales which can be administered separately: 1. Anxiety or fear of computers 2. Confidence in the ability to use computers 3. Liking or enjoying working with computers 4. Computer usefulnessThe LAS contains forty ‐three, 5 ‐point, Likert ‐format items that assess levels of library anxiety experienced by college students. It also has five subscales as follows: 1. Barriers with staff 2. Affective barriers 3. Comfort with the library 4. Knowledge of the library 5. Mechanical barriers Main results – There were twenty correlations between the library anxiety subscale scores and the computer attitude subscale scores. Four of these correlations were statistically significant. Liking or enjoying working with computers was statistically significantly linked to affective barriers, comfort with the library, and knowledge of the library. There was also a statistically significant association between an attitude of computer usefulness and knowledge of the library. Conclusion – These findings suggest that in this group of students there is a medium to strong relationship between computer

  3. Cloud computing security requirements: a systematic review

    NARCIS (Netherlands)

    Iankoulova, Iliana; Daneva, Maya; Rolland, C.; Castro, J.; Pastor, O.

    2012-01-01

    Many publications have dealt with various types of security requirements in cloud computing but not all types have been explored in sufficient depth. It is also hard to understand which types of requirements have been under-researched and which are most investigated. This paper's goal is to provide

  4. Computer Literacy Systematic Literature Review Method

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter; Barth, Susanne; Klaassen, Randy; Wieringa, Roelf J.

    2017-01-01

    Although there have been many attempts to define the concept `computer literacy', no consensus has been reached: many variations of the concept exist within literature. The majority of papers does not explicitly define the concept at all, instead using an unjustified subset of elements related to co

  5. Alternative treatment technology information center computer database system

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, D. [Environmental Protection Agency, Edison, NJ (United States)

    1995-10-01

    The Alternative Treatment Technology Information Center (ATTIC) computer database system was developed pursuant to the 1986 Superfund law amendments. It provides up-to-date information on innovative treatment technologies to clean up hazardous waste sites. ATTIC v2.0 provides access to several independent databases as well as a mechanism for retrieving full-text documents of key literature. It can be accessed with a personal computer and modem 24 hours a day, and there are no user fees. ATTIC provides {open_quotes}one-stop shopping{close_quotes} for information on alternative treatment options by accessing several databases: (1) treatment technology database; this contains abstracts from the literature on all types of treatment technologies, including biological, chemical, physical, and thermal methods. The best literature as viewed by experts is highlighted. (2) treatability study database; this provides performance information on technologies to remove contaminants from wastewaters and soils. It is derived from treatability studies. This database is available through ATTIC or separately as a disk that can be mailed to you. (3) underground storage tank database; this presents information on underground storage tank corrective actions, surface spills, emergency response, and remedial actions. (4) oil/chemical spill database; this provides abstracts on treatment and disposal of spilled oil and chemicals. In addition to these separate databases, ATTIC allows immediate access to other disk-based systems such as the Vendor Information System for Innovative Treatment Technologies (VISITT) and the Bioremediation in the Field Search System (BFSS). The user may download these programs to their own PC via a high-speed modem. Also via modem, users are able to download entire documents through the ATTIC system. Currently, about fifty publications are available, including Superfund Innovative Technology Evaluation (SITE) program documents.

  6. Suspense is the Key. Narratology, Cognitive Neurosciences and Computer Technology

    Directory of Open Access Journals (Sweden)

    Stefano Calabrese

    2016-01-01

    Full Text Available The Narratology of new generation shows renewed heuristic scenarios, providing an intense dialogue among Humanities, Cognitive Neuroscience and Computer Technology. The suspense case is emblematic: its spread and the pleasure exercised by this rhetorical strategy on the human mind can be precisely explained by identifying the mechanisms of reward provided by neurological and Imaging studies. At the same time, patterns of automatic generation of narrative highlight the profound implications of a heated debate between Narratology and Computer Technology, in order to understand the processes of reception and inference during the narrative immersion in storyworlds. At the end of overview on of a cross-disciplinary approach of suspense analysis, the authors repost a case study considered of interest, provided by the North Caroline State University researchers group, called Liquid Narrative Group. 

  7. Importance of Computer Model Validation in Pyroprocessing Technology Development

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Y. E.; Li, Hui; Yim, M. S. [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2014-05-15

    In this research, we developed a plan for experimental validation of one of the computer models developed for ER process modeling, i. e., the ERAD code. Several candidate surrogate materials are selected for the experiment considering the chemical and physical properties. Molten salt-based pyroprocessing technology is being examined internationally as an alternative to treat spent nuclear fuel over aqueous technology. The central process in pyroprocessing is electrorefining(ER) which separates uranium from transuranic elements and fission products present in spent nuclear fuel. ER is a widely used process in the minerals industry to purify impure metals. Studies of ER by using actual spent nuclear fuel materials are problematic for both technical and political reasons. Therefore, the initial effort for ER process optimization is made by using computer models. A number of models have been developed for this purpose. But as validation of these models is incomplete and often times problematic, the simulation results from these models are inherently uncertain.

  8. Cone beam computed tomography in Endodontics - a review

    NARCIS (Netherlands)

    Patel, S.; Durack, C.; Abella, F.; Shemesh, H.; Roig, M.; Lemberg, K.

    2015-01-01

    Cone beam computed tomography (CBCT) produces undistorted three-dimensional information of the maxillofacial skeleton, including the teeth and their surrounding tissues with a lower effective radiation dose than computed tomography. The aim of this paper is to: (i) review the current literature on

  9. Parallel Computing in Information Retrieval--An Updated Review.

    Science.gov (United States)

    Macfarlane, A.; And Others

    1997-01-01

    Reviews the progress of parallel computing in information retrieval (IR) and stresses the importance of the motivation in using parallel computing for text retrieval. Analyzes parallel IR systems using a classification defined by Rasmussen; describes retrieval models used in parallel information processing; and suggests areas of needed research.…

  10. Cone beam computed tomography in Endodontics - a review

    NARCIS (Netherlands)

    Patel, S.; Durack, C.; Abella, F.; Shemesh, H.; Roig, M.; Lemberg, K.

    2015-01-01

    Cone beam computed tomography (CBCT) produces undistorted three-dimensional information of the maxillofacial skeleton, including the teeth and their surrounding tissues with a lower effective radiation dose than computed tomography. The aim of this paper is to: (i) review the current literature on t

  11. Integrating computer technology in the teaching of Biology

    OpenAIRE

    GarrawayLashley, Yassanne

    2014-01-01

    Over the past decade, the number of students who gained satisfactory passes at the Caribbean Secondary Education Certificate (CSEC) in Biology in Guyana has been few. This poor performance may be attributed to the traditional method of teaching that was used to teach Biology. This study therefore ascertained if the integration of computer technology into the teaching of Biology would enhance students’ academic performance. The study was guided by a null research hypothesis. Hence, the related...

  12. Vector Field Visual Data Analysis Technologies for Petascale Computational Science

    Energy Technology Data Exchange (ETDEWEB)

    Garth, Christoph; Deines, Eduard; Joy, Kenneth I.; Bethel, E. Wes; Childs, Hank; Weber, Gunther; Ahern, Sean; Pugmire, Dave; Sanderson, Allen; Johnson, Chris

    2009-11-13

    State-of-the-art computational science simulations generate large-scale vector field data sets. Visualization and analysis is a key aspect of obtaining insight into these data sets and represents an important challenge. This article discusses possibilities and challenges of modern vector field visualization and focuses on methods and techniques developed in the SciDAC Visualization and Analytics Center for Enabling Technologies (VACET) and deployed in the open-source visualization tool, VisIt.

  13. Using Soft Computing Technologies for the Simulation of LCAC Dynamics

    Science.gov (United States)

    2011-09-01

    real-time, time-domain predictions of the vehicle’s dynamics as a function of the control signals given by the driver. Results are presented...free- running LCAC model, faster-than-real-time simulation, soft computing technology 1.0 INTRODUCTION The Maneuvering and Control Division (MCD...like all hovercraft , rides on a cushion of air. The air is supplied to the cushion by four centrifugal fans driven by the craft’s gas turbine

  14. The Application of Computer Music Technology to College Students

    Directory of Open Access Journals (Sweden)

    Wang Na

    2016-01-01

    Full Text Available Contemporary music education started late in China on the basis of western teaching theories formed its own unique system, which has a great influence on present computer music technology. This paper explores that contemporary music education is analyzed advantages and disadvantages of the influence on the development of Chinese class music, and the solutions are found out to the existing problems, summed up the reality enlightenment of that the contemporary music on the impact of education.

  15. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  16. Computer Science Research Review 1974-75

    Science.gov (United States)

    1975-08-01

    mwmmmimmm^m^mmmrm. : i i 1 Faculty and Visitors Mario Barbaccl Research Associate B.S., Universidad Nacional de Ingenieria , Lima, Peru (1966...Engineer, Universidad Nacional de Ingenieria , Lima, Peru (1968) Ph.D., Carnegie-Mellon University (1974) Carnegie. 1969: Design Automation...Compitational Complexity Jack R Buchanan Assistant Professor of Computer Science and Industrial Administration B.S., University of Utah (1965) M.A

  17. Advances in parallel computer technology for desktop atmospheric dispersion models

    Energy Technology Data Exchange (ETDEWEB)

    Bian, X.; Ionescu-Niscov, S.; Fast, J.D. [Pacific Northwest National Lab., Richland, WA (United States); Allwine, K.J. [Allwine Enviornmental Serv., Richland, WA (United States)

    1996-12-31

    Desktop models are those models used by analysts with varied backgrounds, for performing, for example, air quality assessment and emergency response activities. These models must be robust, well documented, have minimal and well controlled user inputs, and have clear outputs. Existing coarse-grained parallel computers can provide significant increases in computation speed in desktop atmospheric dispersion modeling without considerable increases in hardware cost. This increased speed will allow for significant improvements to be made in the scientific foundations of these applied models, in the form of more advanced diffusion schemes and better representation of the wind and turbulence fields. This is especially attractive for emergency response applications where speed and accuracy are of utmost importance. This paper describes one particular application of coarse-grained parallel computer technology to a desktop complex terrain atmospheric dispersion modeling system. By comparing performance characteristics of the coarse-grained parallel version of the model with the single-processor version, we will demonstrate that applying coarse-grained parallel computer technology to desktop atmospheric dispersion modeling systems will allow us to address critical issues facing future requirements of this class of dispersion models.

  18. A virtual computer lab for distance biomedical technology education

    Science.gov (United States)

    Locatis, Craig; Vega, Anibal; Bhagwat, Medha; Liu, Wei-Li; Conde, Jose

    2008-01-01

    Background The National Library of Medicine's National Center for Biotechnology Information offers mini-courses which entail applying concepts in biochemistry and genetics to search genomics databases and other information sources. They are highly interactive and involve use of 3D molecular visualization software that can be computationally taxing. Methods Methods were devised to offer the courses at a distance so as to provide as much functionality of a computer lab as possible, the venue where they are normally taught. The methods, which can be employed with varied videoconferencing technology and desktop sharing software, were used to deliver mini-courses at a distance in pilot applications where students could see demonstrations by the instructor and the instructor could observe and interact with students working at their remote desktops. Results Student ratings of the learning experience and comments to open ended questions were similar to those when the courses are offered face to face. The real time interaction and the instructor's ability to access student desktops from a distance in order to provide individual assistance and feedback were considered invaluable. Conclusion The technologies and methods mimic much of the functionality of computer labs and may be usefully applied in any context where content changes frequently, training needs to be offered on complex computer applications at a distance in real time, and where it is necessary for the instructor to monitor students as they work. PMID:18366629

  19. Some Issues on Computer Networks: Architecture and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    Guan-Qun Gu; Jun-Zhou Luo

    2006-01-01

    The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware,wireless/mobile network, new generation network services and applications, and foundational theories on network modeling.Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.

  20. Training Effects on Computer-Mediated Peer Review

    Science.gov (United States)

    Liou, Hsien-Chin; Peng, Zhong-Yan

    2009-01-01

    The interactive functions of weblogs facilitate computer-mediated peer reviews for collaborative writing. As limited research has been conducted on examining the training effects of peer reviews on students' peer comments, their revision quality, and their perceptions when composing in weblogs, the present case study aims to fill the gap. Thirteen…

  1. General review of the MOSTAS computer code for wind turbines

    Science.gov (United States)

    Dungundji, J.; Wendell, J. H.

    1981-01-01

    The MOSTAS computer code for wind turbine analysis is reviewed, and techniques and methods used in its analyses are described. Impressions of its strengths and weakness, and recommendations for its application, modification, and further development are made. Basic techniques used in wind turbine stability and response analyses for systems with constant and periodic coefficients are reviewed.

  2. A Methodological Review of Computer Science Education Research

    Science.gov (United States)

    Randolph, Justus; Julnes, George; Sutinen, Erkki; Lehman, Steve

    2008-01-01

    Methodological reviews have been used successfully to identify research trends and improve research practice in a variety of academic fields. Although there have been three methodological reviews of the emerging field of computer science education research, they lacked reliability or generalizability. Therefore, because of the capacity for a…

  3. Application of Computer Integration Technology for Fire Safety Analysis

    Institute of Scientific and Technical Information of China (English)

    SHI Jianyong; LI Yinqing; CHEN Huchuan

    2008-01-01

    With the development of information technology, the fire safety assessment of whole structure or region based on the computer simulation has become a hot topic. However, traditionally, the concemed studies are performed separately for different objectives and difficult to perform an overall evaluation. A new multi-dimensional integration model and methodology for fire safety assessment were presented and two newly developed integrated systems were introduced to demonstrate the function of integration simulation technology in this paper. The first one is the analysis on the fire-resistant behaviors of whole structure under real fire loads. The second one is the study on fire evaluation and emergency rescue of campus based on geography information technology (GIS). Some practical examples are presented to illuminate the advan-tages of computer integration technology on fire safety assessment and emphasize some problems in the simulation. The results show that the multi-dimensional integration model offers a new way and platform for the integrating fire safety assessment of whole structure or region, and the integrated software developed is the useful engineering tools for cost-saving and safe design.

  4. Discuss the Development of Computer-Aided Industrial Design Technology

    Directory of Open Access Journals (Sweden)

    Jun Yao

    2013-01-01

    Full Text Available The direction of the development of the industrial design gradually approaches mechanical-electrical integration and informational and electronic products. With an increasing improvement of its technical content, and better social economic conditions, peoples consumption concept are getting more and more different. Consumer concerns not just the functionality and quality of the product, more and more people are starting to focus on the appearance of the product, degree of innovation, environmental protection, and so on, which brings a higher degree of difficulty to the industrial technology. It is because the increasing demands of people and the industrial design, many scholars are increasingly concerned about the industrial design in recent years. With the continuous development of computer technology, a wide variety of hardware and software are developed, and a variety of ever-changing technologies are attracting the industrial design talents as well.

  5. 2013 Building Technologies Office Program Peer Review Report

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-11-01

    The 2013 Building Technologies Office Program Peer Review Report summarizes the results of the 2013 Building Technologies Office (BTO) peer review, which was held in Washington, D.C., on April 2–4, 2013. The review was attended by over 300 participants and included presentations on 59 BTO-funded projects: 29 from BTO’s Emerging Technologies Program, 20 from the Commercial Buildings Integration Program, 6 from the Residential Buildings Integration Program, and 4 from the Building Energy Codes Program. This report summarizes the scores and comments provided by the independent reviewers for each project.

  6. A Review on Impacts of Cloud Computing on Digital Forensics

    Directory of Open Access Journals (Sweden)

    Farid Daryabar

    2015-05-01

    Full Text Available Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud. Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech. This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.

  7. Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    Directory of Open Access Journals (Sweden)

    Sumit Goyal

    2014-02-01

    Full Text Available These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

  8. The application of computer assisted technologies (CAT in the rehabilitation of cognitive functions in psychiatric disorders of childhood and adolescence

    Directory of Open Access Journals (Sweden)

    Tomasz Srebnicki

    2016-06-01

    Full Text Available First applications of computer-assisted technologies (CAT in the rehabilitation of cognitive deficits, including child and adolescent psychiatric disorders date back to the 80’s last century. Recent developments in computer technologies, wide access to the Internet and vast expansion of electronic devices resulted in dynamic increase in therapeutic software as well as supporting devices. The aim of computer assisted technologies is the improvement in the comfort and quality of life as well as the rehabilitation of impaired functions. The goal of the article is the presentation of most common computer-assisted technologies used in the therapy of children and adolescents with cognitive deficits as well as the literature review of their effectiveness including the challenges and limitations in regard to the implementation of such interventions.

  9. Energy & technology review, November--December 1993

    Energy Technology Data Exchange (ETDEWEB)

    Quirk, W.J.; Canada, J.; de Vore, L.; Gleason, K.; Kirvel, R.D.; Kroopnick, H.; McElroy, L. [eds.

    1993-11-01

    For the 40-plus years of the Cold War, both the United States and the Soviet Union built up nuclear stockpiles of tens of thousands of weapons. Now, as the Cold War has ended and tensions between the superpowers have subsided, the US faces the task of significantly reducing its nuclear arsenal. Many thousands of nuclear weapons are being removed from the stockpile as a result of recent treaties and unilateral decisions. This issue of Energy and Technology Review describes the Laboratory`s role in the nation`s effort to dismantle these weapons safely and rapidly. The dismantlement of the United States` nuclear weapons takes place at the Department of Energy`s Pantex facility near Amarillo, Texas. The first article in this issue summarizes the Laboratory`s involvement in dismantling Livermore-designed nuclear weapons. LLNL (like Los Alamos) has responsibility for the weapons it designed, from design concept to retirement. In the past, the responsibilities ended when the weapon was retired from the stockpile. Now however, the role has been extended to include dismantlement. The second article reports on an incident that occurred in November 1992, in which the pit of a W48 warhead cracked during dismantlement. The Laboratory was called upon to handle the pit safely and determine the causes of the cracking. The third article explores a variety of methods proposed for reusing the high explosives after they are removed from the weapon. In the past, Laboratory work on nuclear weapons focused primarily on design and development. However, as the size and composition of the US stockpile changes with evolving international conditions, they will be called upon with increasing frequency to provide the scientific and technical expertise needed to dismantle the nation`s retired nuclear weapons safely and efficiently.

  10. Cloud Computing : Goals, Issues, SOA, Integrated Technologies and Future -scope

    Directory of Open Access Journals (Sweden)

    V. Madhu Viswanatham

    2016-10-01

    Full Text Available The expansion of networking infrastructure has provided a novel way to store and access resources in a reliable, convenient and affordable means of technology called the Cloud. The cloud has become so popular and established its dominance in many recent world innovations and has highly influenced the trend of the Business process Management with the advantage of shared resources. The ability to remain disaster tolerant, on-demand scalability, flexible deployment and cost effectiveness has made the future world technologies like Internet of Things, to determine the cloud as their data and processing center. However, along with the implementation of cloud based technologies, we must also address the issues involved in its realization. This paper is a review on the advancements, scopes and issues involved in realizing a secured cloud powered environments.

  11. Energy and technology review, January--February 1995. State of the laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Bookless, W.A.; Stull, S.; Cassady, C.; Kaiper, G.; Ledbetter, G.; McElroy, L.; Parker, A. [eds.

    1995-02-01

    This issue of Energy and Technology Review highlights the Laboratory`s 1994 accomplishments in their mission areas and core programs--economic competitiveness, national security, lasers, energy, the environment, biology and biotechnology, engineering, physics and space science, chemistry and materials science, computations, and science and math education. LLNL is a major national resource of science and technology expertise, and they are committed to applying this expertise to meet vital national needs.

  12. Computer program for distance learning of pesticide application technology.

    Science.gov (United States)

    Maia, Bruno; Cunha, Joao P A R

    2011-12-01

    Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1) Basic concepts, (2) Factors that affect application, (3) Equipments, (4) Spraying nozzles, (5) Sprayer calibration, (6) Aerial application, (7) Chemigation, (8) Physical-chemical properties, (9) Formulations, (10) Adjuvants, (11) Water quality, and (12) Adequate use of pesticides. The program was made available to the public on July 1(st), 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.

  13. 2015 DOE Vehicle Technologies Office Annual Merit Review

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2015-11-01

    The 2015 U.S. Department of Energy (DOE) Fuel Cell Technologies Office (FCTO) and Vehicle Technologies Office (VTO) Annual Merit Review and Peer Evaluation Meeting (AMR) was held June 8-12, 2015, in Arlington, Virginia. The review encompassed all of the work done by the FCTO and the VTO: 258 individual activities were reviewed for VTO, by 170 reviewers. A total of 1,095 individual review responses were received for the VTO technical reviews. The objective of the meeting was to review the accomplishments and plans for VTO over the previous 12 months, and provide an opportunity for industry, government, and academia to give inputs to DOE on the Office with a structured and formal methodology. The meeting also provided attendees with a forum for interaction and technology information transfer.

  14. 2013 DOE Vehicle Technologies Office Annual Merit Review

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-10-01

    The 2013 U.S. Department of Energy (DOE) Fuel Cell Technologies Office (FCTO) and Vehicle Technologies Office (VTO) Annual Merit Review and Peer Evaluation Meeting (AMR) was held May 13-17, 2013, in Crystal City, Virginia. The review encompassed all of the work done by the FCTO and the VTO: a total of 287 individual activities were reviewed for VTO, by a total of 187 reviewers. A total of 1,382 individual review responses were received for the VTO technical reviews. The objective of the meeting was to review the accomplishments and plans for VTO over the previous 12 months, and provide an opportunity for industry, government, and academia to give inputs to DOE on the Office with a structured and formal methodology. The meeting also provided attendees with a forum for interaction and technology information transfer.

  15. 2014 DOE Vehicle Technologies Office Annual Merit Review

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-11-01

    The 2014 U.S. Department of Energy (DOE) Fuel Cell Technologies Office (FCTO) and Vehicle Technologies Office (VTO) Annual Merit Review and Peer Evaluation Meeting (AMR) was held June 16-20, 2014, in Washington, DC. The review encompassed all of the work done by the FCTO and the VTO: a total of 295 individual activities were reviewed for VTO, by a total of 179 reviewers. A total of 1,354 individual review responses were received for the VTO technical reviews. The objective of the meeting was to review the accomplishments and plans for VTO over the previous 12 months, and provide an opportunity for industry, government, and academia to give inputs to DOE on the Office with a structured and formal methodology. The meeting also provided attendees with a forum for interaction and technology information transfer.

  16. Learning with Computer-Based Learning Environments: A Literature Review of Computer Self-Efficacy

    Science.gov (United States)

    Moos, Daniel C.; Azevedo, Roger

    2009-01-01

    Although computer-based learning environments (CBLEs) are becoming more prevalent in the classroom, empirical research has demonstrated that some students have difficulty learning with these environments. The motivation construct of computer-self efficacy plays an integral role in learning with CBLEs. This literature review synthesizes research…

  17. Review of Potential Threats on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Dr. Ananthi Seshasaayee

    2013-07-01

    Full Text Available Cloud Computing is the evolution, over the past 20+ years, of a continuous trend towards the industrialization of IT. This is in part due to the popularity of outsourcing and hosting of increasingly industrialized service definitions and cost structures & pricing. This has also spurred dramatic growth in popularity and use of both internet and corporate wide intranets as trusted delivery models. But are they safe and secure for storing confidential information? How can we make sure that the client has total control over their data on the cloud? Is it true that in order to reduce the cost of operation and efficiency, we have to comprising giving away sensitive data? This paper does an in-depth study of the recurring vulnerabilities.

  18. Integrated Geo Hazard Management System in Cloud Computing Technology

    Science.gov (United States)

    Hanifah, M. I. M.; Omar, R. C.; Khalid, N. H. N.; Ismail, A.; Mustapha, I. S.; Baharuddin, I. N. Z.; Roslan, R.; Zalam, W. M. Z.

    2016-11-01

    Geo hazard can result in reducing of environmental health and huge economic losses especially in mountainous area. In order to mitigate geo-hazard effectively, cloud computer technology are introduce for managing geo hazard database. Cloud computing technology and it services capable to provide stakeholder's with geo hazards information in near to real time for an effective environmental management and decision-making. UNITEN Integrated Geo Hazard Management System consist of the network management and operation to monitor geo-hazard disaster especially landslide in our study area at Kelantan River Basin and boundary between Hulu Kelantan and Hulu Terengganu. The system will provide easily manage flexible measuring system with data management operates autonomously and can be controlled by commands to collects and controls remotely by using “cloud” system computing. This paper aims to document the above relationship by identifying the special features and needs associated with effective geohazard database management using “cloud system”. This system later will use as part of the development activities and result in minimizing the frequency of the geo-hazard and risk at that research area.

  19. Human factors design review guidelines for advanced nuclear control room technologies

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, J.; Brown, W. (Brookhaven National Lab., Upton, NY (United States)); Granda, T.; Baker, C. (Carlow Associates, Inc., Fairfax, VA (United States))

    1991-01-01

    Advanced control rooms (ACRs) for future nuclear power plants are being designed utilizing computer-based technologies. The US Nuclear Regulatory Commission reviews the human engineering aspects of such control rooms to ensure that they are designed to good human factors engineering principles and that operator performance and reliability are appropriately supported in order to protect public health and safety. This paper describes the rationale, general approach, and initial development of an NRC Advanced Control Room Design Review Guideline. 20 refs., 1 fig.

  20. Understanding the technology of computer technology diffusion: explaining computer adoption patterns and implications for the wage structure

    OpenAIRE

    Borghans, L.; ter Weel, B.J.

    2008-01-01

    We review the empirical literature about the implications of the computerization of the labor market to see whether it can explain observed computer adoption patterns and (long-term) changes in the wage structure. Evidence from empirical micro-economic studies turns out to be inconsistent with macro-economic studies that are based on Constant Elasticity of Substitution (CES) production functions. We propose a micro-economic foundation for the CES production function that allows for changes in...

  1. Ultrasonication and food technology: A review

    OpenAIRE

    Ishrat Majid; Gulzar Ahmad Nayik; Vikas Nanda

    2015-01-01

    With increasing consumers demand and tightening of food and environmental regulations, traditional food-processing techniques have lost their optimum performance which gave rise to new and powerful technologies. Ultrasonic is a one of the fast, versatile, emerging, and promising non-destructive green technology used in the food industry from last few years. The ultrasound is being carried out in various areas of food technology namely crystallization, freezing, bleaching, degassing, extractio...

  2. A review of advanced manufacturing technology

    Science.gov (United States)

    Broughton, T.

    1981-03-01

    Joining techniques, hot forming technology, forging technology, investment casting, small cooling hole manufacturing, combustor technology, quality assurance, and chip forming machining of gas turbine engine components are discussed. Electron and laser beam welding; laser hard facing techniques; automatic TIG and plasma welding; diffusion brazing of titanium and nickel alloys; heated die forming: blow forming; superplastic forming; fan and compressor blade forging; and wheel and disk forging from powder superalloys are described.

  3. RECENT RELATED RESEARCH IN TECHNOLOGY ACCEPTANCE MODEL: A LITERATURE REVIEW

    OpenAIRE

    Shih-Chih Chen; Shing-Han Li; Chien-Yi Li

    2011-01-01

    Technology Acceptance Model is widely applied to access users’ usage in various information system/information technology areas. Learning the critical role of Technology Acceptance Model can guide researchers to design different users’ interface for different online customers, and consequently achieve high user usage in different application areas. This study reviewed 24 studies to understand the past, now and future of Technology Acceptance Model. We discussed the related studies to ...

  4. Knowledge of Computer Ergonomics among Computer Science Engineering and Information Technology Students in Karnataka, India

    Directory of Open Access Journals (Sweden)

    Mohamed Sherif Sirajudeen

    2017-04-01

    Full Text Available Ergonomics is the science of designing the job to fit the worker. Neglect of ergonomic principles results in inefficiency and pain in the workplace. The objective of this research is to assess the knowledge of Computer Ergonomics among Computer Science Engineering and Information Technology Students in Karnataka. In this Cross-sectional study, 177 Computer Science Engineering and Information Technology Students were recruited. A questionnaire is used to gather details regarding Personal characteristics, Computer Usage and Knowledge of Ergonomics. Descriptive statistics was produced for Personal characteristics and Computer usage. The distribution of responses to the items related to Ergonomic knowledge was presented by percentage of the subjects who answered correctly. The results shows that Majority of the subjects were unaware of ergonomics (32.8% correct responses, cumulative trauma disorders (18.6% correct responses, healthy postures related to elbow (34.4% correct responses, wrist & hand (39.5% correct responses, Level of Monitor (35% correct responses, Position of mouse (47.4% correct responses and Mini breaks (42.9% correct responses. This research highlighted the necessity of Ergonomic training regarding healthy postures and the measures to reduce the risk of musculoskeletal disorders for the students.

  5. RECENT RELATED RESEARCH IN TECHNOLOGY ACCEPTANCE MODEL: A LITERATURE REVIEW

    Directory of Open Access Journals (Sweden)

    Shih-Chih Chen

    2011-10-01

    Full Text Available Technology Acceptance Model is widely applied to access users’ usage in various information system/information technology areas. Learning the critical role of Technology Acceptance Model can guide researchers to design different users’ interface for different online customers, and consequently achieve high user usage in different application areas. This study reviewed 24 studies to understand the past, now and future of Technology Acceptance Model. We discussed the related studies to clarify the extension of Technology Acceptance Model. Besides, the application areas are elaborated including electronic service, mobile data service, self-service technology, electronic learning and so on. Finally, the article concluded the conclusions and future research direction.

  6. Technology development multidimensional review for engineering and technology managers

    CERN Document Server

    Neshati, Ramin; Watt, Russell; Eastham, James

    2014-01-01

    Developing new products, services, systems, and processes has become an imperative for any firm expecting to thrive in today’s fast-paced and hyper-competitive environment.  This volume integrates academic and practical insights to present fresh perspectives on new product development and innovation, showcasing lessons learned on the technological frontier.  The first part emphasizes decision making.  The second part focuses on technology evaluation, including cost-benefit analysis, material selection, and scenarios. The third part features in-depth case studies to present innovation management tools, such as customer needs identification, technology standardization, and risk management. The fourth part highlights important international trends, such as globalization and outsourcing. Finally the fifth part explores social and political aspects.

  7. Review on the study of entanglement in quantum computation speedup

    Institute of Scientific and Technical Information of China (English)

    DING ShengChao; JIN Zhi

    2007-01-01

    The role the quantum entanglement plays in quantum computation speedup has been widely disputed.Some believe that quantum computation's speedup over classical computation is impossible if entanglement is absent, while others claim that the presence of entanglement is not a necessary condition for some quantum algorithms.This paper discusses this problem systematically.Simulating quantum computation with classical resources is analyzed and entanglement in known algorithms is reviewed.It is concluded that the presence of entanglement is a necessary but not sufficient condition in the pure state or pseudo-pure state quantum computation speedup.The case with the mixed state remains open.Further work on quantum computation will benefit from the presented results.

  8. Current Cloud Computing Review and Cost Optimization by DERSP

    Directory of Open Access Journals (Sweden)

    M. Gomathy

    2014-03-01

    Full Text Available Cloud computing promises to deliver cost saving through the “pay as you use” paradigm. The focus is on adding computing resources when needed and releasing them when the need is serviced. Since cloud computing relies on providing computing power through multiple interconnected computers, there is a paradigm shift from one large machine to a combination of multiple smaller machine instances. In this paper, we review the current cloud computing scenario and provide a set of recommendations that can be used for designing custom applications suited for cloud deployment. We also present a comparative study on the change in cost incurred while using different combinations of machine instances for running an application on cloud; and derive the case for optimal cost

  9. International Conference on Modern Mathematical Methods and High Performance Computing in Science and Technology

    CERN Document Server

    Srivastava, HM; Venturino, Ezio; Resch, Michael; Gupta, Vijay

    2016-01-01

    The book discusses important results in modern mathematical models and high performance computing, such as applied operations research, simulation of operations, statistical modeling and applications, invisibility regions and regular meta-materials, unmanned vehicles, modern radar techniques/SAR imaging, satellite remote sensing, coding, and robotic systems. Furthermore, it is valuable as a reference work and as a basis for further study and research. All contributing authors are respected academicians, scientists and researchers from around the globe. All the papers were presented at the international conference on Modern Mathematical Methods and High Performance Computing in Science & Technology (M3HPCST 2015), held at Raj Kumar Goel Institute of Technology, Ghaziabad, India, from 27–29 December 2015, and peer-reviewed by international experts. The conference provided an exceptional platform for leading researchers, academicians, developers, engineers and technocrats from a broad range of disciplines ...

  10. Review of Infrared Technology in the Netherlands

    NARCIS (Netherlands)

    Jong, A.N. de

    1993-01-01

    The use of infrared sensors in the Netherlands is substantial. Users can be found in a variety of disciplines, military as well as civil. This need for IR sensors implied a long history on IR technology and development. The result was a large technological-capability allowing the realization of IR h

  11. Book Review: English Language Learning and Technology

    OpenAIRE

    Shojaei, Abouzar; Motallebzadeh, Khalil

    2016-01-01

    This book is a very helpful book which gives us information and knowledge of using technology in language learning and teaching. It contains detailed consideration to articulatory and auditory Language learning as well as to the practicalities of English language learning. The book discusses the relationship between English language learning and technology

  12. Using Computer Technology to Foster Learning for Understanding

    Directory of Open Access Journals (Sweden)

    Elaine Van Melle

    2009-12-01

    Full Text Available The literature shows that students typically use either a surface approach to learning, in which the emphasis is on memorization of facts, or a deep approach to learning, in which learning for understanding is the primary focus. This paper describes how computer technology, specifically the use of a multimedia CD-ROM, was integrated into a microbiology curriculum as part of the transition from focusing on facts to fostering learning for understanding. Evaluation of the changes in approaches to learning over the course of the term showed a statistically significant shift in a deep approach to learning, as measured by the Study Process Questionnaire. Additional data collected showed that the use of computer technology supported this shift by providing students with the opportunity to apply what they had learned in class to order tests and interpret the test results in relation to specific patient-focused case studies. The extent of the impact, however, varied among different groups of students in the class. For example, students who were recent high school graduates did not show a statistically significant increase in deep learning scores over the course of the term and did not perform as well in the course. The results also showed that a surface approach to learning was an important aspect of learning for understanding, although only those students who were able to combine a surface with a deep approach to learning were successfully able to learn for understanding. Implications of this finding for the future use of computer technology and learning for understanding are considered.

  13. Advanced intelligent computational technologies and decision support systems

    CERN Document Server

    Kountchev, Roumen

    2014-01-01

    This book offers a state of the art collection covering themes related to Advanced Intelligent Computational Technologies and Decision Support Systems which can be applied to fields like healthcare assisting the humans in solving problems. The book brings forward a wealth of ideas, algorithms and case studies in themes like: intelligent predictive diagnosis; intelligent analyzing of medical images; new format for coding of single and sequences of medical images; Medical Decision Support Systems; diagnosis of Down’s syndrome; computational perspectives for electronic fetal monitoring; efficient compression of CT Images; adaptive interpolation and halftoning for medical images; applications of artificial neural networks for real-life problems solving; present and perspectives for Electronic Healthcare Record Systems; adaptive approaches for noise reduction in sequences of CT images etc.

  14. Application Specific Performance Technology for Productive Parallel Computing

    Energy Technology Data Exchange (ETDEWEB)

    Malony, Allen D. [Univ. of Oregon, Eugene, OR (United States); Shende, Sameer [Univ. of Oregon, Eugene, OR (United States)

    2008-09-30

    Our accomplishments over the last three years of the DOE project Application- Specific Performance Technology for Productive Parallel Computing (DOE Agreement: DE-FG02-05ER25680) are described below. The project will have met all of its objectives by the time of its completion at the end of September, 2008. Two extensive yearly progress reports were produced in in March 2006 and 2007 and were previously submitted to the DOE Office of Advanced Scientific Computing Research (OASCR). Following an overview of the objectives of the project, we summarize for each of the project areas the achievements in the first two years, and then describe in some more detail the project accomplishments this past year. At the end, we discuss the relationship of the proposed renewal application to the work done on the current project.

  15. Processing instrumentation technology: Process definition with a cognitive computer

    Energy Technology Data Exchange (ETDEWEB)

    Price, H.L. [Wilkes Univ., Wilkes-Barre, PA (United States). Mechanical and Materials Engineering Dept.

    1996-11-01

    Much of the polymer composites industry is built around the thermochemical conversion of raw material into useful composites. The raw materials (molding compound, prepreg) often are made up of thermosetting resins and small fibers or particles. While this conversion can follow a large number of paths, only a few paths are efficient, economical and lead to desirable composite properties. Processing instrument (P/I) technology enables a computer to sense and interpret changes taking place during the cure of prepreg or molding compound. P/I technology has been used to make estimates of gel time and cure time, thermal diffusivity measurements and transition temperature measurements. Control and sensing software is comparatively straightforward. The interpretation of results with appropriate software is under development.

  16. The Development of Sociocultural Competence with the Help of Computer Technology

    Science.gov (United States)

    Rakhimova, Alina E.; Yashina, Marianna E.; Mukhamadiarova, Albina F.; Sharipova, Astrid V.

    2017-01-01

    The article deals with the description of the process of development sociocultural knowledge and competences using computer technologies. On the whole the development of modern computer technologies allows teachers to broaden trainees' sociocultural outlook and trace their progress online. Observation of modern computer technologies and estimation…

  17. The Development of Sociocultural Competence with the Help of Computer Technology

    Science.gov (United States)

    Rakhimova, Alina E.; Yashina, Marianna E.; Mukhamadiarova, Albina F.; Sharipova, Astrid V.

    2017-01-01

    The article deals with the description of the process of development sociocultural knowledge and competences using computer technologies. On the whole the development of modern computer technologies allows teachers to broaden trainees' sociocultural outlook and trace their progress online. Observation of modern computer technologies and estimation…

  18. Relating North American Experiences with Computer-Related Technology in Education to Developing Countries.

    Science.gov (United States)

    Collis, Betty

    This essay considers several areas of research in computer technology for education in North America and the implications of these areas of focus for the implementation of educational computer technologies in developing nations. The five areas of focus are: (1) curriculum integration, or the general rationale for using computer technology in…

  19. 25 CFR 502.7 - Electronic, computer or other technologic aid.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Electronic, computer or other technologic aid. 502.7... DEFINITIONS OF THIS CHAPTER § 502.7 Electronic, computer or other technologic aid. (a) Electronic, computer or other technologic aid means any machine or device that: (1) Assists a player or the playing of a...

  20. Balanced technology initiative on computational mechanics of materials

    Science.gov (United States)

    Asaro, Robert J.

    1993-04-01

    The goal of this project, which was part of the DARPA Balanced Technology Initiative on Computational Mechanics, was to develop a comprehensive approach to the numerical modeling of the mechanical behavior of materials. Particular areas for focus in the project were the inelastic deformation of highly anisotropic materials such as single crystals and textured polycrystals, as well as evolving microstructural damage in ceramics and ductile metals in both slow and high rate deformation processes. While the contract was awarded for a period of three years, it was actually funded only for the first year. Nonetheless, significant progress can be reported as a direct result of this project.

  1. Soft Computing in Information Communication Technology Volume 2

    CERN Document Server

    2012-01-01

    This book is a collection of the accepted papers concerning soft computing in information communication technology. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Fuzzy Logic, Machine Learning, Cryptography, Pattern Recognition, Bioinformatics, Biomedical Engineering, Advancements in ICT.

  2. Computational defect review for actinic mask inspections

    Science.gov (United States)

    Morgan, Paul; Rost, Daniel; Price, Daniel; Corcoran, Noel; Satake, Masaki; Hu, Peter; Peng, Danping; Yonenaga, Dean; Tolani, Vikram

    2013-04-01

    As optical lithography continues to extend into low-k1 regime, resolution of mask patterns continues to diminish. The limitation of 1.35 NA posed by water-based lithography has led to the application of various resolution enhancement techniques (RET), for example, use of strong phase-shifting masks, aggressive OPC and sub-resolution assist features, customized illuminators, etc. The adoption of these RET techniques combined with the requirements to detect even smaller defects on masks due to increasing MEEF, poses considerable challenges for a mask inspection engineer. Inspecting masks under their actinic-aerial image conditions would detect defects that are more likely to print under those exposure conditions. However, this also makes reviewing such defects in their low-contrast aerial images very challenging. On the other hand, inspecting masks under higher resolution inspection optics would allow for better viewing of defects post-inspection. However, such inspections generally would also detect many more defects, including printable and nuisance, thereby making it difficult to judge which are of real concern for printability on wafer. Often, an inspection engineer may choose to use Aerial and/or high resolution inspection modes depending on where in the process flow the mask is and the specific device-layer characteristics of the mask. Hence, a comprehensive approach is needed in handling defects both post-aerial and post-high resolution inspections. This analysis system is designed for the Applied Materials Aera™ mask inspection platform, all data reported was collected using the Aera.

  3. Proceedings of the 2012 International Conference on Information Technology and Software Engineering : Information Technology & Computing Intelligence

    CERN Document Server

    Cai, Guoqiang; Liu, Weibin; Xing, Weiwei

    2013-01-01

    Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong Uni...

  4. Cone beam computed tomography in Endodontics - a review.

    Science.gov (United States)

    Patel, S; Durack, C; Abella, F; Shemesh, H; Roig, M; Lemberg, K

    2015-01-01

    Cone beam computed tomography (CBCT) produces undistorted three-dimensional information of the maxillofacial skeleton, including the teeth and their surrounding tissues with a lower effective radiation dose than computed tomography. The aim of this paper is to: (i) review the current literature on the applications and limitations of CBCT; (ii) make recommendations for the use of CBCT in Endodontics; (iii) highlight areas of further research of CBCT in Endodontics. © 2014 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  5. Counseling Student Computer Competency Skills: Effects of Technology Course in Training.

    Science.gov (United States)

    Edwards, Yolanda V.; Portman, Tarrell Awe Agahe; Bethea, James

    2002-01-01

    The focus of this article is to assess counseling student computer competency level as an effect of a one-credit hour introductory course in computer technology. Results indicate student computer competencies increased after completing the computer technology course in the following areas: ethics, assisting clients with internet searches,…

  6. Science and Technology Review, December 1997

    Energy Technology Data Exchange (ETDEWEB)

    Upadhye, R.

    1997-12-01

    Featured articles in this issue cover progress in these areas: Advancing Technologies and Applications in Nondestructive Evaluation; Atomic Engineering with Multilayers; Marrying Astrophysics with the Earth; Continuing Work in Breast Cancer Detection Technologies. Furthermore, this issue lists patents issued to and/or the awards received by Laboratory employees. It also includes an index of the contents of all the issues published in calendar year 1997.

  7. A Comparative Review on Car Parking Technologies

    OpenAIRE

    R.Ranjini; D. Manivannan

    2013-01-01

    Information technology embeds microchips and sensors within vehicles, traffic lights, roads and makes transportation system to communicate using wireless technologies. Intelligent transport system embodies several functionalities such as traffic monitoring, parking assistant, and vehicle monitoring by making the system smarter. Parking plays a vital role amongst them. Developing countries are facing major parking management problems. Most of the available parking methods do not satisfy the us...

  8. Federal Council on Science, Engineering and Technology: Committee on Computer Research and Applications, Subcommittee on Science and Engineering Computing: The US Supercomputer Industry

    Energy Technology Data Exchange (ETDEWEB)

    1987-12-01

    The Federal Coordinating Council on Science, Engineering, and Technology (FCCSET) Committee on Supercomputing was chartered by the Director of the Office of Science and Technology Policy in 1982 to examine the status of supercomputing in the United States and to recommend a role for the Federal Government in the development of this technology. In this study, the FCCSET Committee (now called the Subcommittee on Science and Engineering Computing of the FCCSET Committee on Computer Research and Applications) reports on the status of the supercomputer industry and addresses changes that have occured since issuance of the 1983 and 1985 reports. The review based upon periodic meetings with and site visits to supercomputer manufacturers and consultation with experts in high performance scientific computing. White papers have been contributed to this report by industry leaders and supercomputer experts.

  9. Computer and mobile technology-based interventions for substance use disorders: an organizing framework.

    Science.gov (United States)

    Litvin, Erika B; Abrantes, Ana M; Brown, Richard A

    2013-03-01

    Research devoted to the development of therapeutic, behavioral interventions for substance use disorders (SUDs) that can be accessed and delivered via computer and mobile technologies has increased rapidly during the past decade. Numerous recent reviews of this literature have supported the efficacy of technology-based interventions (TBIs), but have also revealed their great heterogeneity and a limited understanding of treatment mechanisms. We conducted a "review of reviews" focused on summarizing findings of previous reviews with respect to moderators of TBIs' efficacy, and present an organizing framework of considerations involved in designing and evaluating TBIs for SUDs. The four primary elements that comprise our framework are Accessibility, Usage, Human Contact, and Intervention Content, with several sub-elements within each category. We offer some suggested directions for future research grouped within these four primary considerations. We believe that technology affords unique opportunities to improve, support, and supplement therapeutic and peer relationships via dynamic applications that adapt to individuals' constantly changing motivation and treatment needs. We hope that our framework will aid in guiding programmatic progress in this exciting field.

  10. Preservice teachers’ preparedness to integrate computer technology into the curriculum

    Directory of Open Access Journals (Sweden)

    Jelena Magliaro

    2008-05-01

    Full Text Available For Canada to compete effectively in the digital world, beginning teachers need to play an important role in integrating computer technology into the curriculum. Equipment and connectivity do not guarantee successful or productive use of computers in the classroom, but the combination of the teaching style and technology use has the potential to change education. In this research, the computer self-efficacy beliefs of 210 preservice teachers after their first practice teaching placements were examined. First, the quantitative component of the study involved the use of Computer User Self-Efficacy (CUSE scale where students’ previous undergraduate degree, licensure area, experience and familiarity with software packages were found to have statistically significant effects on computer self-efficacy. Second, the qualitative data indicated that society and school were the most positive factors that influenced preservice teachers’ attitudes towards computers, while the family had the highest percentage of negative influence. Findings reveal that although preservice teachers had completed only two months of the program, those with higher CUSE scores were more ready to integrate computers into their lessons than those with lower scores. Résumé: Pour que le Canada puisse entrer en compétition dans le monde numérique, les nouveaux enseignants devront jouer un rôle important d’intégration des technologies informatiques dans le curriculum. Les équipements et la connectivité ne garantissent pas une utilisation gagnante ou productive de l’ordinateur en salle de classe, mais la combinaison de styles d’enseignement et d’usages de la technologie a le potentiel de changer l’éducation. Dans cette étude, les croyances d’auto-efficacité à l’ordinateur de 210 futurs enseignants après leur première affectation ont été examinées. Premièrement, la partie quantitative de l’étude impliquait l’utilisation de l’échelle du Computer

  11. General review of the MOSTAS computer code for wind turbines

    Energy Technology Data Exchange (ETDEWEB)

    Dugundji, J.; Wendell, J.H.

    1981-06-01

    The MOSTAS computer code for wind turbine analysis is reviewed, and the techniques and methods used in its analyses are described in some detail. Some impressions of its strengths and weaknesses, and some recommendations for its application, modification, and further development are made. Additionally, some basic techniques used in wind turbine stability and response analyses for systems with constant and periodic coefficients are reviewed in the Appendices.

  12. Computing Technologies for Oriented Education: Applications in Biological Sciences

    Directory of Open Access Journals (Sweden)

    Santiago Jaime Reyes

    2005-12-01

    Full Text Available The experience developing modern digital programs with highly qualified profesoors with several years of teaching postgraduate biological sciences matters is described. A small group of selected professors with a minimum knowledged or basic domain in computer software were invited to develop digital programs in the items of their interest,the purpose is to establish the bases for construction of an available digital library. The products to develop are a series of CD-ROM with program source in HTML format. The didactic strategy responds to a personal tutorship, step by step workshop, to build its own project (without programming languages. The workshop begins generating trust in very simple activities. It is designed to learn building and to advance evaluating the progress. It is fulfilled the necessity to put up-to-date the available material that regularly uses to impart the classes (video, slides, pictures, articles, examples etc. The information and computing technologies ICT are a indispensable tool to diffuse the knowledge to a coarser and more diverse public in the topics of their speciality. The obtained products are 8 CD ROM with didactic programs designed with scientific and technological bases.

  13. Computers in Diagnostic Nuclear Medicine Imaging - A Review

    Directory of Open Access Journals (Sweden)

    K. K. Kapoor

    1989-07-01

    Full Text Available Digital computers are becoming increasingly popular for a variety of purposes in nuclear medicine. They are particuiarly useful in the areas of nuclear imaging and gamma camera image processing,radionuclide inventory and patient record keeping. By far the most important use of the digital computer is in array processors which are commonly available with emission computed systems for fast reconstruction of images in transverse, coronal and sagittal views, particularly when the data to be handled is enormous and involves filtration and correction processes. The addition of array processors to computer systems has helped the clinicians in improving diagnostic nuclear medicine imaging capability. This paper reviews briefly therole of computers in the field of nuclear medicine imaging.

  14. Review of the current wind energy technologies and global market

    OpenAIRE

    Komarov, Dragan; Stupar, Slobodan; Posteljnik, Zorana

    2011-01-01

    The modern wind energy technologies and recent global wind energy market trends are reviewed in the paper. Basic principles of conversion of wind energy to electricity are described with brief overview of the state-of-the-art technologies for subassemblies such as wind turbine blades and drive trains. Global wind energy market was reviewed in order to attain notion of wind power market developments in the future. The most developed countries in terms of wind energy utilization such as Denmark...

  15. The paradox of imaging technology: A review of the literature

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, F.J. [School of Radiography, University of Wales, Bangor Archimedes Centre, Technology Park, Wrexham LL13 7YP (United Kingdom)]. E-mail: f.murphy@bangor.ac.uk

    2006-05-15

    Purpose: The purpose of this study was to review the social scientific literature associated with medical imaging technology. Methods: An extensive search of published studies in nursing, psychology and anthropology was undertaken to support the radiography specific literature. Results: Following a broad definition of technology and its profound influence on society, an analysis of imaging literature revealed a complex relationship between technology and human interactions. Examples are cited for CT, MRI and ultrasound. Conclusion: It is suggested that any attempt to understand imaging technology must place at its centre the perspectives of patients and radiographers. Scientific descriptors must be balanced with equal deliberation given to 'soft technology'.

  16. Technology and innovation: 2010 a year in review.

    Science.gov (United States)

    Sanberg, Paul R; Vindrola-Padros, Cecilia; Eve, David J; Federoff, Howard J

    2011-01-01

    The following commentary provides a discussion of the articles published in Technology and Innovation in 2010 and where possible places them into context with those reported in Cell Transplantation. These articles can be divided into the following topics: a) models for innovation and technological commercialization, b) the ethical and legal consequences of the emergence of new technologies, c) research on novel technologies and methods, and d) the difficulties involved in peer review and scientific assessment. The articles shed light on the effects of technological innovation and commercialization on scientific ethical regulation, the establishment of legal standards for the protection of intellectual property, and the development of financial models.

  17. An introduction to Computer Guided Implantology; literature review، historical background and basic concepts

    Directory of Open Access Journals (Sweden)

    Nikzad S

    2010-06-01

    Full Text Available "nSurgical and prosthodontic implant complications are often the case of inadvertent improper diagnosis, planning, and placement. These complications always pose a significant challenge in implant dentistry. In this article, it is attempted to depict a new technique in which advanced software program along with newly developed CAD/CAM technology called rapid prototyping will be used. This technology permits graphic and complex 3D implant simulation and then fabrication of computer-generated surgical templates. The best position of implants planned at first by taking into consideration of encased bone density of each implants and then existing occlusion. In this paper, the evolution of Computer Guided Implantology and the many benefits achieved from this very sophisticated technology described as a literature review.

  18. Science and Technology Review April 2001

    Energy Technology Data Exchange (ETDEWEB)

    Quong, A.A.

    2001-04-01

    This issue contains the following articles: (1) ''Computer Modeling Advances Bioscience''. (2) ''A New Kind of Biological Research'' Researchers are using advanced computer simulations to reveal the mechanisms of a host of biological phenomena. (3) ''The World's Most Accurate Lathe'' Used to make large mirrors for the National Aeronautical and Space Administration and the Department of Defense, Livermore's Large Optics Diamond Turning Machine is over 1,000 times more accurate than a conventional machine tool. (4) ''Leading the Attack on Cancer'' Scientists from Lawrence Livermore and the University of California at Davis Cancer Center are collaborating on research to find better ways to prevent, detect, diagnose, and treat cancer. (5) ''Electronic Memory Goes High Rise '' Stackable magnetic random access memory may improve computer performance.

  19. Immersive technology and the elderly: a mini-review.

    Science.gov (United States)

    Shelton, Brett E; Uz, Cigdem

    2015-01-01

    Technologies that provide immersive experiences continue to become more ubiquitous across all age groups. This paper presents a review of the literature to provide a snapshot of the current state of research involving the use of immersive technologies and the elderly. A narrative literature review was conducted using the ScienceDirect, EBSCOhost, Springerlink and ERIC databases to summarize primary studies from which conclusions were drawn into a holistic interpretation. The majority of the studies examined the effect of immersive technologies on elder peoples' age-related declines, including sensory and motor changes (vision, hearing, motor skills), cognitive changes and social changes. Various immersive technologies have been described and tested to address these age-related changes, and have been categorized as 'games and simulations', 'robotics' and 'social technologies'. In most cases, promising results were found for immersive technologies to challenge age-related declines, especially through the increase of morale.

  20. How is technology accepted by users? A review of technology acceptance models and theories

    OpenAIRE

    Alomary, Azza; Woollard, John

    2015-01-01

    This paper provides a literature review of the popular theories and models of technology acceptance of relevance to today’s technology developments in the 4E context. The original technology acceptance model (TAM) was derived from the theory of reasoned action and has since been developed and extended to include factors of age, gender, prior experience, ability, etc. It provides the framework to measure users’ perceptions of and intentions to use technology within and across organisations. Th...

  1. Science and Technology Review September 2001

    Energy Technology Data Exchange (ETDEWEB)

    Quong, A.A.

    2001-09-01

    This issue contains the following articles: (1) ''Technology Transfer Takes a Team''. (2) ''Zeroing In on Genes'' With Gene Recovery Microdissection, sequencing an entire genome to find its genes will no longer be necessary. (3) ''Big Glass for a Big Laser'' Together, Livermore and two leading laser glass producers have developed a revolutionary new method for making big pieces of high-quality laser glass. (4) ''Lasershot Makes Its Mark'' The Lasershot Marking System creates permanent, high-resolution identification marks on safety-critical metal parts, without weakening the part. (5) ''Tracking the Global Spread of Advanced Technology'' The Center for Global Security Research takes on the challenge of analyzing and raising awareness of the potential national security threats posed by advances in science and technology.

  2. A Review of Energy Storage Technologies

    DEFF Research Database (Denmark)

    Connolly, David

    2010-01-01

    -alone technology that will be utilised in Ireland for the integration of fluctuating renewable energy. However, the HESS, TESS, and EVs are the also very promising, but require more research to remove uncertainty surrounding their benefits and costs. For some countries, CAES could be a more suitable technology......), Battery Energy Storage (BES), Flow Battery Energy Storage (FBES), Flywheel Energy Storage (FES), Supercapacitor Energy Storage (SCES), Superconducting Magnetic Energy Storage (SMES), Hydrogen Energy Storage System (HESS), Thermal Energy Storage (TES), and Electric Vehicles (EVs). The objective...... was to identify the following for each: 1. How it works 2. Advantages 3. Applications 4. Cost 5. Disadvantages 6. Future A brief comparison was then completed to indicate the broad range of operating characteristics available for energy storage technologies. It was concluded that PHES is the most likely stand...

  3. Research on surveying technology applied for DTM modelling and volume computation in open pit mines

    Directory of Open Access Journals (Sweden)

    Jaroslaw Wajs

    2016-01-01

    Full Text Available The spatial information systems of mining company can be used for monitoring of mining activity, excavation planning, calculations of the ore volume and decision making. Nowadays, data base has to be updated by sources such as surveying positioning technologies and remote sensed photogrammetry data. The presented paper contains review of the methodology for the digital terrain model, i.e. DTM, modelling and obtaining data from surveying technologies in an open pit mine or quarry. This paper reviews the application of GPS, total station measurements, and ground photogrammetry for the volume accuracy assessment of a selected object. The testing field was situated in Belchatow lignite open pit mine. A suitable object had been selected. The testing layer of coal seam was located at 8’th pit sidewall excavation area. The data were acquired two times within one month period and it was connected with monthly DTM actualization of excavation. This paper presents the technological process and the results of the research of using digital photogrammetry for opencast mining purposes in the scope of numerical volume computation and monitoring the mines by comparison of different sources. The results shows that the presented workflow allow to build DTM manually and remote sensed and the accuracy assessment was presented by the volume computation pathway. Major advantages of the techniques are presented illustrating how a terrestrial photogrammetry techniques provide rapid spatial measurements of breaklines 3D data utilized to volume calculation.

  4. Factors Influencing Technology Planning in Developing Countries: A Literature Review

    Science.gov (United States)

    Keengwe, Jared; Malapile, Sandy

    2014-01-01

    This article is a literature review concerning the factors that play an important role in the development of educational technology plans in the educational system of developing countries (DCs). Largely, the technology plans are influenced by factors that emanates from within the country (internal) and those outside of their borders (external).…

  5. Technology in Social Work Education: A Systematic Review

    Science.gov (United States)

    Wretman, Christopher J.; Macy, Rebecca J.

    2016-01-01

    Given the growing prevalence of technology-based instruction, social work faculty need a clear understanding of the strengths and limitations of these methods. We systematically examined the evidence for technology-based instruction in social work education. Using comprehensive and rigorous methods, 38 articles were included in the review. Of…

  6. Motor Abilities in Autism: A Review Using a Computational Context

    Science.gov (United States)

    Gowen, Emma; Hamilton, Antonia

    2013-01-01

    Altered motor behaviour is commonly reported in Autism Spectrum Disorder, but the aetiology remains unclear. Here, we have taken a computational approach in order to break down motor control into different components and review the functioning of each process. Our findings suggest abnormalities in two areas--poor integration of information for…

  7. An index to medical book reviews: a computer experiment.

    Science.gov (United States)

    Atwood, R

    1967-01-01

    The experimental production of an index to book reviews of medical publications is described. Details of compilation and preparation of data for processing by an IBM 1440 computer are outlined. Results of a survey testing the response to the index in its present form by medical libraries are presented.

  8. Review and Prospect of Cobalt-60 Digital Radiography Inspection Technology

    OpenAIRE

    AN Ji-gang

    2015-01-01

    This article is a review and prospect of the research, development and industrialization of Cobalt-60 digital radiography inspection technology based on the national requirements in the recent 20 years, which is leaded by Institute of Nuclear and New Energy Technology (INET) of TsinghuaUniversity. The research purpose, innovative approach and main academic achievements of this technology were described systematically. The industrial equipment varieties, performance, running condition and appl...

  9. Consumer adoption of mobile technologies: a literature review

    OpenAIRE

    Sanakulov, Nodir; Karjaluoto, Heikki

    2015-01-01

    Although the total number of mobile subscriptions reached 6.8 billion worldwide (ITU, 2013) confirming in the process that mobile technology is widespread, academic literature has so far focused only on explaining adoption of mobile technology and services. This literature review analyses 67 studies from the period 2005-2013 and finds the following: a) most studies are quantitative in nature and come from Asia; b) the Technology Acceptance Model is the most used theory; c) future research sho...

  10. Combating Terrorism Technology Support Office 2007 Review

    Science.gov (United States)

    2007-01-01

    investigate terrorism. Develop advanced methods to extract and enhance audio recordings and video images from surveillance sources. Identify computer...Selected Current Projects Steganography Decryption Terrorists can communicate secretly over the Internet by using steganography , which is the... steganography , then isolates and decrypts them. In addition to having advanced detection and decryption capabilities, the tool will use distributive

  11. Science and technology review, March 1997

    Energy Technology Data Exchange (ETDEWEB)

    Upadhye, R.

    1997-03-01

    The articles in this month`s issue are entitled Site 300`s New Contained Firing Facility, Computational Electromagnetics: Codes and Capabilities, Ergonomics Research:Impact on Injuries, and The Linear Electric Motor: Instability at 1,000 g`s.

  12. Energy and Technology Review, September 1990

    Energy Technology Data Exchange (ETDEWEB)

    Burnham, A.K.; Johnson, K.C.; Ryerson, F.J. (eds.)

    1990-01-01

    This report discusses the following topics: identifying the universe's dark matter; computer simulations of cosmic ray acceleration; the interiors of uranus and neptune; seismic imaging of the deep structure of northern California; and geochemical tracing of lead contaminants in the environment.

  13. Evidence of effectiveness of health care professionals using handheld computers: a scoping review of systematic reviews.

    Science.gov (United States)

    Mickan, Sharon; Tilson, Julie K; Atherton, Helen; Roberts, Nia Wyn; Heneghan, Carl

    2013-10-28

    Handheld computers and mobile devices provide instant access to vast amounts and types of useful information for health care professionals. Their reduced size and increased processing speed has led to rapid adoption in health care. Thus, it is important to identify whether handheld computers are actually effective in clinical practice. A scoping review of systematic reviews was designed to provide a quick overview of the documented evidence of effectiveness for health care professionals using handheld computers in their clinical work. A detailed search, sensitive for systematic reviews was applied for Cochrane, Medline, EMBASE, PsycINFO, Allied and Complementary Medicine Database (AMED), Global Health, and Cumulative Index to Nursing and Allied Health Literature (CINAHL) databases. All outcomes that demonstrated effectiveness in clinical practice were included. Classroom learning and patient use of handheld computers were excluded. Quality was assessed using the Assessment of Multiple Systematic Reviews (AMSTAR) tool. A previously published conceptual framework was used as the basis for dual data extraction. Reported outcomes were summarized according to the primary function of the handheld computer. Five systematic reviews met the inclusion and quality criteria. Together, they reviewed 138 unique primary studies. Most reviewed descriptive intervention studies, where physicians, pharmacists, or medical students used personal digital assistants. Effectiveness was demonstrated across four distinct functions of handheld computers: patient documentation, patient care, information seeking, and professional work patterns. Within each of these functions, a range of positive outcomes were reported using both objective and self-report measures. The use of handheld computers improved patient documentation through more complete recording, fewer documentation errors, and increased efficiency. Handheld computers provided easy access to clinical decision support systems and

  14. Science and technology review, September 1998 issue

    Energy Technology Data Exchange (ETDEWEB)

    Smart, J

    1998-09-01

    This issue focuses on monitoring the Comprehensive Test Ban Treaty. A feature article on the history of the Laboratory is also included. Other articles highlight X-ray laser technology and the ground testing of microsatellites that emulates the free-floating environment of actual space flight

  15. Technology Review for Mobile Multimedia Learning Environments

    Science.gov (United States)

    Styliaras, Georgios

    2015-01-01

    Nowadays, the technological advancement in mobile devices has made possible the development of hypermedia applications that exploit their features. A potential application domain for mobile devices is multimedia educational applications and modules. Such modules may be shared, commented and further reused under other circumstances through the…

  16. Adult Education in Radiologic Technology: A Review.

    Science.gov (United States)

    Dowd, Steven B.

    In almost all its aspects, radiologic technology education is adult education. Boyle's (1981) adult learning model has four components: (1) the learner in terms of motivation; (2) learning as a change process; (3) the experiential role of education; and (4) the facilitative role of the educator. Andragogy, as defined by Knowles (1977, 1980), is a…

  17. A review of wearable technology in medicine.

    Science.gov (United States)

    Iqbal, Mohammed H; Aydin, Abdullatif; Brunckhorst, Oliver; Dasgupta, Prokar; Ahmed, Kamran

    2016-10-01

    With rapid advances in technology, wearable devices have evolved and been adopted for various uses, ranging from simple devices used in aiding fitness to more complex devices used in assisting surgery. Wearable technology is broadly divided into head-mounted displays and body sensors. A broad search of the current literature revealed a total of 13 different body sensors and 11 head-mounted display devices. The latter have been reported for use in surgery (n = 7), imaging (n = 3), simulation and education (n = 2) and as navigation tools (n = 1). Body sensors have been used as vital signs monitors (n = 9) and for posture-related devices for posture and fitness (n = 4). Body sensors were found to have excellent functionality in aiding patient posture and rehabilitation while head-mounted displays can provide information to surgeons to while maintaining sterility during operative procedures. There is a potential role for head-mounted wearable technology and body sensors in medicine and patient care. However, there is little scientific evidence available proving that the application of such technologies improves patient satisfaction or care. Further studies need to be conducted prior to a clear conclusion. © The Royal Society of Medicine.

  18. Combating Terrorism Technology Support Office 2006 Review

    Science.gov (United States)

    2006-01-01

    listed in the International Dictionary of Cosmetic Ingredients, Clean Earth Technologies, LLC developed and tested a portable simulant training kit for...underwater. The design includes a multipurpose housing with an integrated means of attachment that is waterproof to depths of 190 feet. The cutting

  19. 2009 DOE Vehicle Technologies Program Annual Merit Review

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2009-10-01

    Annual Merit Review and Peer Evaluation Meeting to review the FY2008 accomplishments and FY2009 plans for the Vehicle Technologies Program, and provide an opportunity for industry, government, and academic to give inputs to DOE on the Program with a structured and formal methodology.

  20. Review: DNA microarray technology and drug development

    Directory of Open Access Journals (Sweden)

    Sana Khan

    2010-01-01

    Full Text Available On the contrary to slow and non specific traditional drug discovery methods, DNA microarray technology could accelerate the identification of potential drugs for treating diseases like cancer, AIDS and provide fruitful results in the drug discovery. The technique provides efficient automation and maximum flexibility to the researchers and can test thousand compounds at a time. Scientists find DNA microarray useful in disease diagnosis, monitoring desired and adverse outcomes of therapeutic interventions, as well as, in the selection, assessment and quality con-trol of the potential drugs. In the current scenario, where new pathogens are expected every year, DNA microarray promises as an efficient technology to detect new organisms in a short time. Classification of carcinomas at the molecular level and prediction of how various types of tumor respond to different therapeutic agents can be made possible with the use of microarray analysis. Also, microarray technique can prove instrumental in personalized medicines development by providing microarray data of a patient which could be used for identifying diseases, treatment specific to individual and trailing disease prognosis. Microarray analysis could be beneficial in the area of molecular medicines for analysis of genetic variations and functions of genes in normal individuals and diseased conditions. The technique can give satisfactory results in single nucleotide polymorphism (SNP analysis and pharmacogenomics studies. The challenges that arise with the technology are high degree of variability with data obtained, frequent up gradation of methods and machines and lack of trained manpower. Despite this, DNA micro-array promises to be the next generation sequencer which could explain how organisms evolve and adapt looking at the whole genome. In a nutshell, Microarray technology makes it possible for molecular biologists to analyze simultaneously thousands of DNA samples and monitor their